SOT, but you have prolly solved this already...
How do you prevent somebody taking a (L)GPL'ed or Open
source for a JVM and/or core classes, hacking backdoors
and trojan horses into it, and deploying it? To be
more precise: sure it'll be either obvious (source is
there) or illegal (violation of
I think - this needs the use of PGP.
And for signed applets - there is a need for support from JVM.
SOT, but you have prolly solved this already...
How do you prevent somebody taking a (L)GPL'ed or Open
source for a JVM and/or core classes, hacking backdoors
and trojan horses into it, and
2 matches
Mail list logo