On Mon, 2007-01-15 at 18:26 +0100, Marcus Brinkmann wrote: > Well, in this case I have the upper hand in the discussion, because we > definitely have exciting and convincing evidence that mutually > suspicious collaboration can and will happen in transparent computer > systems. As a primary example, I cite Wikipedia, which has strong > security without opaqueness. (If you want an example at the operating > system level, I cite the Incompatible Timesharing System, ITS, > although that is less convincing because it comes from a time where > the computing environment was quite different. Still the similarities > to Wikipedia's security mechanisms are all too obvious, so it has to > be mentioned).
An interesting assertion. What are Wikipedia's security mechanisms? -- Jonathan S. Shapiro, Ph.D. Managing Director The EROS Group, LLC +1 443 927 1719 x5100 _______________________________________________ L4-hurd mailing list [email protected] http://lists.gnu.org/mailman/listinfo/l4-hurd
