[14936] in cryptography@c2.net mail archive
Re: example: secure computing kernel needed
daemon@ATHENA.MIT.EDU (Bill Stewart)
Sun Dec 14 18:10:13 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sun, 14 Dec 2003 12:21:45 -0800
To: "Email List: Cryptography" <cryptography@metzdowd.com>
From: Bill Stewart <bill.stewart@pobox.com>
In-Reply-To: <01fa01c3c252$5039add0$01c8a8c0@broadbander>
At 02:41 PM 12/14/2003 +0000, Dave Howe wrote:
>Paul A.S. Ward wrote:
> > I'm not sure why no one has considered the PC banking problem to be a
> > justification for secure computing. Specifically, how does a user
> > know their computer has not been tampered with when they wish to use
> > it for banking access.
>I think PC banking is an argument *against* Secure Computing as currently
>proposed - there is no way to discover if there is a nasty "running" in
>protected memory or removing it if there is.
Agreed. It's a better argument for booting from a known CDROM distribution.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com