On Wed, Nov 11, 2015 at 1:50 PM, Ben Kloosterman <bkloo...@gmail.com> wrote:
> http://joeduffyblog.com/2015/11/10/objects-as-secure-capabilities/
>
> Some interesting comments so far ..

hmm, I didn't see any comments,
guess I need to go look in the usual places for them

I find the following bit particularly interesting:

>>Well, what's wrong with this?
>>
>>It's imprecise. It relies on ambient state that is invisible to the program. 
>>You
>>can't easily audit to see the security implications of the operation. You just
>>need to know how open works.

as i've somewhat stumbled over it making 'consensus gates', which is
like a sealer/unsealer pair in which the unsealer is fragmented and
distributed to multiple parties, meaning unsealing depends upon the
logic inside the consensus gate...

at first impression this seems ok because holding a fragment of an
unsealer is holding some piece of potential authority, but contains a
risk of confusion when looking at the authority contained within a
domain contrasted with the authority given by the logic within the
domain.

my thoughts have been to split invocations/type signatures between
messages which provide authority to properties of objects and being
compiler generated will return some capability under normal and
non-proxied behavior, and those which suffer from some variation of
the halting problem making it undecidable whether they will pass on
some authority... or disallowing such gates all together...

I say non-proxied because this requires a different guarantee that
'allegedType' can't give and seems to require tying in with the whole
factory branding mechanism
_______________________________________________
bitc-dev mailing list
bitc-dev@coyotos.org
http://www.coyotos.org/mailman/listinfo/bitc-dev

Reply via email to