On Sun, Aug 14, 2005 at 02:06:02AM -0400, Alan Young wrote:
> There is always going to be security risks.  With everything.  The
> only secure system is one not plugged in to the wall and the
> programmer(s) shot.

One definition of a ``perfectly secure'' system is one that does
exactly what the owner intends for it to do; no more, no less. There
are plenty of ``perfectly secure'' embedded systems out there -- even
systems that run Linux! Furthermore, having a ``pretty dang close to
perfectly secure'' system is conceivable with FLASK-based technology
like SE Linux. The hook primitives are formally verifiable; the worst
you can do with a system that has a good set of policies is denial of
service.

Mike
.___________________________________________________________________.
                         Michael A. Halcrow                          
       Security Software Engineer, IBM Linux Technology Center       
GnuPG Fingerprint: 419C 5B1E 948A FA73 A54C  20F5 DB40 8531 6DCA 8769

Copyright is nothing more than a temporary loan from the public      
domain. 

Attachment: signature.asc
Description: Digital signature

.-----------------------------------.
| This has been a P.L.U.G. mailing. |
|      Don't Fear the Penguin.      |
|  IRC: #utah at irc.freenode.net   |
`-----------------------------------'

Reply via email to