-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Wed, Oct 01, 2008 at 11:19:10AM +0100, alan c wrote:
>Caroline Meeks wrote:
>> On Tue, Sep 30, 2008 at 10:48 AM, Walter Bender 
>> <[EMAIL PROTECTED]>wrote:
>> 
>>>  David and I will be helping set up a Sugar classroom in a Boston 
>>> public school that trying to make use of some old Pentium IV desktop 
>>> machines;

>> When schools, children's libraries, and after-school programs have 
>> computers and they can be changed to boot from the USB it's likely 
>> that the tech people will be willing to do so.

>I have a passing thought - which others may already have considered 
>anyway.
>
>In principle, when booting from a device and running a linux based OS, 
>it is usually possible to obtain control of the host hardware somehow, 
>for example by use of a terminal. I trust that whatever (high?) skill 
>level the usb stick user has, it will not be technically possible to 
>damage the host system's data?

I suspect that to be technically impossible to guarantee.

E.g. how to ensure that the system booted from that stick is not a 
derivation with "evil" formatting tool added?

But relevant any way to be aware of, to at least make _difficult_ to 
wreak havoc (or worse: be able to do damage even by accident).


  - Jonas

- -- 
* Jonas Smedegaard - idealist og Internet-arkitekt
* Tlf.: +45 40843136  Website: http://dr.jones.dk/

  [x] quote me freely  [ ] ask before reusing  [ ] keep private
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkjjYywACgkQn7DbMsAkQLi3EACcC14wrLqevvNDEa71Zecbe2xO
qwcAnidyrHguf8K3v++cTJo61zrOgQDc
=0Eew
-----END PGP SIGNATURE-----
_______________________________________________
IAEP -- It's An Education Project (not a laptop project!)
[email protected]
http://lists.sugarlabs.org/listinfo/iaep

Reply via email to