On Sat, 17 Feb 2007 23:47:47 -0500, Wayne Driscoll wrote:

>You keep claiming that IBM uses the "trust" model, however, that is
>simply not true.  If IBM simply trusted you, the machine wouldn't have
>checks in it to ensure that the built in "spare" capacity couldn't be
>enabled without the machine "phoning home" to verify that the upgrade
>was legitimate.  How about if you allow the vendor code to periodically
>connect to a company web site and report on the STIFLE information found
>on the machine, to ensure that it was being run a comparable sized
>machine?  Then it would follow IBM's "trust" model.
 
 
What about sites that cannot allow any system-driven connections to the 
outside?  (See the DIACAP military requirements that Defense contractors 
have to abide by for details.)  "Phoning home" is not an option, especially 
for higher-security systems.  

In these cases the vendor is not trusted, at least not enough for that type 
of contact.  
 
-- 
Tom Schmidt 
Madison, WI 
 

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to