A mighty fortress is our PKI, Part II

James A. Donald jamesd at echeque.com
Fri Aug 6 14:57:44 EDT 2010

On 2010-08-05 11:30 AM, David-Sarah Hopwood wrote:
 > Signatures are largely a distraction from the real problem: that software
 > is (unnecessarily) run with the full privileges of the invoking user.
 > By all means authenticate software, but that's not going to prevent 

A lot of devices are locked down so that you cannot install bad 
software.  This is somewhat successful in preventing bad software from 
being installed, and highly successful in irritating users.

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com

More information about the cryptography mailing list