example: secure computing kernel needed
David Wagner
daw at taverner.cs.berkeley.edu
Tue Dec 16 17:14:17 EST 2003
Jerrold Leichter wrote:
>We've met the enemy, and he is us. *Any* secure computing kernel that can do
>the kinds of things we want out of secure computing kernels, can also do the
>kinds of things we *don't* want out of secure computing kernels.
I don't understand why you say that. You can build perfectly good
secure computing kernels that don't contain any support for remote
attribution. It's all about who has control, isn't it?
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list