In a recent note, Tom Schmidt said: > Date: Sat, 17 Feb 2007 23:31:25 -0600 > > What about sites that cannot allow any system-driven connections to the > outside? (See the DIACAP military requirements that Defense contractors > have to abide by for details.) "Phoning home" is not an option, especially > for higher-security systems. > > In these cases the vendor is not trusted, at least not enough for that type > of contact. > Well, you can't fight the military -- they've got the big guns.
But short of that, there seems to be an opportunity for a single well-audited (source code available) component through which every "phone home" would filter, verifying its parameter list against a data base of permissible message recipients and contents, etc. -- gil -- StorageTek INFORMATION made POWERFUL ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

