On 10/31/16 6:18 AM, John Hawkinson wrote:
> I think we should not lose sight of the fact that mosh is
> security-sensitive software in a category unlike many other
> software packages, and thus it is worth some inconvenience to
> the maintainers that you might not accept in a less sensitive
> tool.
> 
> Another question: would we rather we be compromised at the same time
> when Github or Travis is compromised, or would we rather be
> compromised independently at a different time? Feel free to substitute
> "if" for "when" if it makes you feel better.

A question in reply:  would we be likelier to *discover* that compromise
on a personal, daily-driver OS X install, or on a cloud service provider
with wide visibility (and exposure)?  I'm dubious of my ability to
discover a compromise on my personal machines, and I'd of course like to
keep them personal.  :)

Again, the idea of, say, a project-owned build VM comes up.  Apple's OS
X licensing would seem to restrict this to an Apple developer and an OS
X host, though, which makes this more difficult.

regards,

  --jh

_______________________________________________
mosh-devel mailing list
mosh-devel@mit.edu
http://mailman.mit.edu/mailman/listinfo/mosh-devel

Reply via email to