[Cryptography] The Laws (was the principles) of secure information systems design

Peter Gutmann pgut001 at cs.auckland.ac.nz
Thu Jul 14 00:56:24 EDT 2016


Ray Dillinger <bear at sonic.net> writes:

>[...]

Nice.  Some changes I'd make to make things a bit more succinct:

>"CA"  -- Some clown in Uzbekistan who paid somebody a bribe.

"A certificate vending machine".

>"Cloud"  -- Computers that someone else can access at will or
>            take away from you at will.

"Someone else's computer".

>"DRM" -- A technology which gives the key to the attacker.

?.  I'd use "a technology for treating the legitimate user as the bad guy".

Peter.


More information about the cryptography mailing list