On Mon, 2007-01-15 at 18:26 +0100, Marcus Brinkmann wrote:

> Well, in this case I have the upper hand in the discussion, because we
> definitely have exciting and convincing evidence that mutually
> suspicious collaboration can and will happen in transparent computer
> systems.  As a primary example, I cite Wikipedia, which has strong
> security without opaqueness.  (If you want an example at the operating
> system level, I cite the Incompatible Timesharing System, ITS,
> although that is less convincing because it comes from a time where
> the computing environment was quite different.  Still the similarities
> to Wikipedia's security mechanisms are all too obvious, so it has to
> be mentioned).

An interesting assertion. What are Wikipedia's security mechanisms?

-- 
Jonathan S. Shapiro, Ph.D.
Managing Director
The EROS Group, LLC
+1 443 927 1719 x5100



_______________________________________________
L4-hurd mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/l4-hurd

Reply via email to