| David Wagner writes:
| To see why, let's go back to the beginning, and look at the threat
| model. If multiple people are doing shared development on a central
| machine, that machine must have an owner -- let's call him Linus. Now
| ask yourself: Do those developers trust Linus?
Just some thoughts.
From: Anne Lynn Wheeler [mailto:[EMAIL PROTECTED]
Sent: Sunday, 21 December 2003 5:40 AM
To: Ernst Lippe
Cc: Jerrold Leichter; [EMAIL PROTECTED]
Subject: Re: Difference between TCPA-Hardware and a smart card (was:
example: secure computing