[11156] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: My Pal Palladium

daemon@ATHENA.MIT.EDU (Udhay Shankar N)
Sat Jul 20 14:09:15 2002

Date: Sat, 20 Jul 2002 09:54:08 +0530
To: reusch <reusch@comcast.net>, cryptography@wasabisystems.com
From: Udhay Shankar N <udhay@pobox.com>
In-Reply-To: <3.0.6.32.20020720042024.0094aa20@mail.comcast.net>

At 04:20 AM 7/20/02 -0400, reusch wrote:

>http://online.securityfocus.com/columnists/96
>"Palladium promises to eliminate buffer overflows"
>
>Oh, yea, right, because the code is signed, magic pixie
>dust, poof, there are no buffer overflows. -MFR

I like [1] the fact that "Trusted Computing" basically boils down to this:

In the BEST possible case (i.e, *no* technical design or implementation 
errors. None whatsoever.) you get to be at the mercy of Microsoft and 
whoever they are in bed with at the time. This Is A Feature, Not A Bug.

The implications of the various other scenarios, given Microsoft's sterling 
record on security, are left as an exercise for the reader.

Udhay

[1] The word "like" has a similar relation to its normal usage as the word 
"trusted" above.

--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
      God is silent. Now if we can only get Man to shut up.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post