[Cryptography] North Korea and Sony

Bill Frantz frantz at pwpconsult.com
Fri Dec 12 18:31:28 EST 2014

On 12/12/14 at 7:06 AM, leichter at lrw.com (Jerry Leichter) wrote:

>BTW, it's this repurposing of the user ID mechanism that makes 
>it complicated to support multiple users on devices running 
>these OS's.

I think Polaris dynamically added UserIDs as needed. I don't see 
how that would interfere with having two or more users on a 
machine, as long as the "real" users had different names from 
the shadow IDs, and that could be done with a naming convention.

Cheers - Bill

Bill Frantz        | The first thing you need when  | Periwinkle
(408)356-8506      | using a perimeter defense is a | 16345 
Englewood Ave
www.pwpconsult.com | perimeter.                     | Los Gatos, 
CA 95032

More information about the cryptography mailing list