[11156] in cryptography@c2.net mail archive
Re: My Pal Palladium
daemon@ATHENA.MIT.EDU (Udhay Shankar N)
Sat Jul 20 14:09:15 2002
Date: Sat, 20 Jul 2002 09:54:08 +0530
To: reusch <reusch@comcast.net>, cryptography@wasabisystems.com
From: Udhay Shankar N <udhay@pobox.com>
In-Reply-To: <3.0.6.32.20020720042024.0094aa20@mail.comcast.net>
At 04:20 AM 7/20/02 -0400, reusch wrote:
>http://online.securityfocus.com/columnists/96
>"Palladium promises to eliminate buffer overflows"
>
>Oh, yea, right, because the code is signed, magic pixie
>dust, poof, there are no buffer overflows. -MFR
I like [1] the fact that "Trusted Computing" basically boils down to this:
In the BEST possible case (i.e, *no* technical design or implementation
errors. None whatsoever.) you get to be at the mercy of Microsoft and
whoever they are in bed with at the time. This Is A Feature, Not A Bug.
The implications of the various other scenarios, given Microsoft's sterling
record on security, are left as an exercise for the reader.
Udhay
[1] The word "like" has a similar relation to its normal usage as the word
"trusted" above.
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
God is silent. Now if we can only get Man to shut up.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com