* Michael Stevens ([EMAIL PROTECTED]) wrote:
> On Sun, Jan 14, 2001 at 11:26:28PM -0500, Mark Rogaski wrote:
> > It's also sheer idiocy to pipe arbitrary code from an untrusted, unverified
> > source directly to the shell.
> 
> How is it less secure than downloading a tar file and typing ./configure?
> 
> Admittedly you *could* check several meg of source for trojans, but I
> don't believe you *do*.
> 

this is something that is going to become a bigger and bigger thing,
i could see the concepts of karma/ebay reputations merging more and
more with digital signatures

needless to say that WIDs make this an even bigger concern

-- 
Greg McCarroll                          http://www.mccarroll.uklinux.net

Reply via email to