[Cryptography] The Laws (was the principles) of secure information systems design
Peter Gutmann
pgut001 at cs.auckland.ac.nz
Thu Jul 14 00:56:24 EDT 2016
Ray Dillinger <bear at sonic.net> writes:
>[...]
Nice. Some changes I'd make to make things a bit more succinct:
>"CA" -- Some clown in Uzbekistan who paid somebody a bribe.
"A certificate vending machine".
>"Cloud" -- Computers that someone else can access at will or
> take away from you at will.
"Someone else's computer".
>"DRM" -- A technology which gives the key to the attacker.
?. I'd use "a technology for treating the legitimate user as the bad guy".
Peter.
More information about the cryptography
mailing list