On Fri, Aug 12, 2011 at 1:23 PM, BGB <cr88...@gmail.com> wrote:
>
>
> also, security-check models are well proven in systems like Windows and
> Linux...
>

It is true that there are success stories using checked permissions. But,
for security, the successes aren't what you should be counting.


> my current planned strategy actually consists of making use of *both* sets
> of strategies (in a sort of half-assed way).
>

I'm sure that strategy will lead you to a sort of half-assed security.


>
> ideally, IMO, the user retains roughly the same level of security as
> before, but applications run under their own virtual users with considerably
> less rights.
>

Look into PLASH and Polaris.
_______________________________________________
fonc mailing list
fonc@vpri.org
http://vpri.org/mailman/listinfo/fonc

Reply via email to