[14998] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Difference between TCPA-Hardware and other forms of trust

daemon@ATHENA.MIT.EDU (Ben Laurie)
Mon Dec 22 18:34:00 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sat, 20 Dec 2003 20:06:44 +0000
From: Ben Laurie <ben@algroup.co.uk>
To: bear <bear@sonic.net>
Cc: Jerrold Leichter <jerrold.leichter@smarts.com>,
	John Gilmore <gnu@toad.com>, cryptography@metzdowd.com,
	gnu@new.toad.com
In-Reply-To: <Pine.LNX.4.58.0312181007140.30666@bolt.sonic.net>

bear wrote:
> I really don't care if anyone *else* trusts my system; as
> far as I'm concerned, their secrets should not be on my
> system in the first place, any more than my secrets should
> be on theirs.

The problem is that their "secrets" are Snow White, or the latest Oasis 
album. You want them on your box, and they want them not to leave your box.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post