On Sun, Aug 14, 2005 at 02:06:02AM -0400, Alan Young wrote: > There is always going to be security risks. With everything. The > only secure system is one not plugged in to the wall and the > programmer(s) shot.
One definition of a ``perfectly secure'' system is one that does
exactly what the owner intends for it to do; no more, no less. There
are plenty of ``perfectly secure'' embedded systems out there -- even
systems that run Linux! Furthermore, having a ``pretty dang close to
perfectly secure'' system is conceivable with FLASK-based technology
like SE Linux. The hook primitives are formally verifiable; the worst
you can do with a system that has a good set of policies is denial of
service.
Mike
.___________________________________________________________________.
Michael A. Halcrow
Security Software Engineer, IBM Linux Technology Center
GnuPG Fingerprint: 419C 5B1E 948A FA73 A54C 20F5 DB40 8531 6DCA 8769
Copyright is nothing more than a temporary loan from the public
domain.
signature.asc
Description: Digital signature
.-----------------------------------. | This has been a P.L.U.G. mailing. | | Don't Fear the Penguin. | | IRC: #utah at irc.freenode.net | `-----------------------------------'
