James A. Donald writes:
Further, genuinely secure systems are now becoming available, notably
Symbian.
What does it mean for Symbian to be genuinely secure? How was this
determined and achieved?
--
http://www.eff.org/about/staff/#chris_palmer
signature.asc
Description: Digital signature
Chris Palmer [EMAIL PROTECTED] writes:
James A. Donald writes:
Further, genuinely secure systems are now becoming available, notably
Symbian.
What does it mean for Symbian to be genuinely secure? How was this determined
and achieved?
By executive fiat.
Peter.
James A. Donald writes:
Further, genuinely secure systems are now becoming available, notably
Symbian.
Chris Palmer [EMAIL PROTECTED]
What does it mean for Symbian to be genuinely secure? How was this
determined and achieved?
There is no official definition of genuinely secure, and it is
hi
( 05.10.26 09:17 -0700 ) James A. Donald:
While many people are rightly concerned that DRM will
ultimately mean that the big corporation, and thus the
state, has root access to their computers and the owner
does not, it also means that trojans, viruses, and
malware does not.
do you
At 10:22 AM -0500 10/31/05, [EMAIL PROTECTED] wrote:
and doesn't history show that big corporations are only interested in
revenue
One should hope so.
;-)
Cheers,
RAH
--
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation
From: R.A. Hettinga [EMAIL PROTECTED]
Sent: Oct 25, 2005 8:34 AM
To: cryptography@metzdowd.com, [EMAIL PROTECTED]
Subject: On the orthogonality of anonymity to current market demand
..
That is to say, your analysis conflicts with the whole trend towards
T-0 trading, execution, clearing
--
John Kelsey
What's with the heat-death nonsense? Physical bearer
instruments imply stout locks and vaults and alarm
systems and armed guards and all the rest, all the way
down to infrastructure like police forces and armies
(private or public) to avoid having the biggest gang
end up
-BEGIN PGP SIGNED MESSAGE-
At 3:57 PM -0400 10/24/05, John Kelsey wrote:
More to the point, an irreversible payment system raises big practical
problems in a world full of very hard-to-secure PCs running the
relevant software. One exploitable software bug, properly used, can
steal an