Author: buildbot
Date: Mon Dec 26 12:10:28 2011
New Revision: 801041

Log:
Staging update by buildbot

Modified:
    websites/staging/river/trunk/content/wot.html

Modified: websites/staging/river/trunk/content/wot.html
==============================================================================
--- websites/staging/river/trunk/content/wot.html (original)
+++ websites/staging/river/trunk/content/wot.html Mon Dec 26 12:10:28 2011
@@ -67,7 +67,7 @@
         <td style="overflow: hidden;" valign="top" width="100%">
           <div class="wiki-content">
 <h1 id="web_of_trust">Web of trust</h1>
-<p>http://en.wikipedia.org/wiki/Web_of_trust</p>
+<p>[http://en.wikipedia.org/wiki/Web_of_trust]</p>
 <p>Gregg: </p>
 <p>... Ultimately, Jini needs, in my opinion, to focus authentication above 
the network layer, and use signed jars, encrypted paths, and cert based auth, 
so that the network path, can not be a part of the exploitation, and instead, 
each end of a "communication", is responsible for trusting the other, through 
negotiations carried through the network, instead of using information about 
the network to guarantee trust.  ...</p>
           </div>


Reply via email to