On Fri, Aug 12, 2011 at 1:23 PM, BGB <cr88...@gmail.com> wrote: > > > also, security-check models are well proven in systems like Windows and > Linux... >
It is true that there are success stories using checked permissions. But, for security, the successes aren't what you should be counting. > my current planned strategy actually consists of making use of *both* sets > of strategies (in a sort of half-assed way). > I'm sure that strategy will lead you to a sort of half-assed security. > > ideally, IMO, the user retains roughly the same level of security as > before, but applications run under their own virtual users with considerably > less rights. > Look into PLASH and Polaris.
_______________________________________________ fonc mailing list fonc@vpri.org http://vpri.org/mailman/listinfo/fonc