[14963] in cryptography@c2.net mail archive
Re: example: secure computing kernel needed
daemon@ATHENA.MIT.EDU (David Wagner)
Thu Dec 18 12:05:10 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: cryptography@metzdowd.com
From: daw@taverner.cs.berkeley.edu (David Wagner)
Date: Tue, 16 Dec 2003 22:14:17 +0000 (UTC)
Reply-To: daw-usenet@taverner.cs.berkeley.edu (David Wagner)
X-Complaints-To: usenet@abraham.cs.berkeley.edu
Jerrold Leichter wrote:
>We've met the enemy, and he is us. *Any* secure computing kernel that can do
>the kinds of things we want out of secure computing kernels, can also do the
>kinds of things we *don't* want out of secure computing kernels.
I don't understand why you say that. You can build perfectly good
secure computing kernels that don't contain any support for remote
attribution. It's all about who has control, isn't it?
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com