<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Wed, May 20, 2015 at 6:02 AM, Peter Gutmann <span dir="ltr"><<a href="mailto:pgut001@cs.auckland.ac.nz" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=pgut001@cs.auckland.ac.nz&cc=&bcc=&su=&body=','_blank');return false;">pgut001@cs.auckland.ac.nz</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Henry Baker <<a href="mailto:hbaker1@pipeline.com" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=hbaker1@pipeline.com&cc=&bcc=&su=&body=','_blank');return false;">hbaker1@pipeline.com</a>> writes:<br>
<br>
>Mathematical proof?<br>
<br>
Because all of the existing security mechanisms we use also have rigorous<br>
mathematical proofs?</blockquote><div><br></div><div>If someone comes up with a mathematical proof for endpoint security, give that person a medalĀ </div></div><div><br></div>-- <br><div class="gmail_signature">Tony Arcieri<br></div>
</div></div>