Thanks for carrying this forward, Francis. Even if we are blocked on
the emulator, it's good to know of the doors that become open once we
have it in place.

I'm sure it's realised by everyone, but it's important to note that
while having the emulator makes this problem tractable, there would be
further work needed to ensure that the emulated phones were
sufficiently isolated from the rest of the environment, and that
control cannot leak back up through the communication channel with the
emulator.

Out of my own curiosity, how confident of the security model are we in
the current arrangement of using a Canonistack Upstream Merger for
these?

-- 
Mailing list: https://launchpad.net/~canonical-ci-engineering
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~canonical-ci-engineering
More help   : https://help.launchpad.net/ListHelp

Reply via email to