[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Fwd: Niches for the Hurd: evaluation method; was: DRM musings, capabilit

From: Michal Suchanek
Subject: Fwd: Niches for the Hurd: evaluation method; was: DRM musings, capabilities and stuff
Date: Fri, 19 Dec 2008 12:03:49 +0100

2008/12/18 Arne Babenhauserheide <arne_bab@web.de>:
> Am Donnerstag 18 Dezember 2008 16:03:39 schrieb Michal Suchanek:
>> > Only if you assume that "security that is actually usable" implies
>> > hiding things from the parent process. As I already explained, we
>> > believe this assumption to be fundamentally wrong. Get over it.
>> As I said numerous times hiding things from child process can be
>> turned into hiding things from parent process. After all, your login
>> shell is normally started by some other service which has all the
>> power to hide things from it. The only difference we are discussing
>> round and round is whether this service is configured to possibly hide
>> something from all shells or if there is a 'root' shell that can
>> access everything.
> Then let's put it simple: If a system is designed to make it hard for the
> admin (the one who controls the actual hard disk and can poke every bit in
> there, using a LiveCD if need be), then it is designed for slavery.
> And from what I now learned, that's the case for Coyotos.

Which part of Coyotos design is that? I have not heard of it so far so
enlighten me, please.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]