Appended inline below.
On 29/07/2021 11:20 am, Peter Firmstone wrote:
The intent of the following process is to perform a targeted audit,
which allows inspection of small parts of the code identified by these
steps.
On 28/07/2021 9:12 am, Peter Firmstone wrote:
Our process for establishin
The intent of the following process is to perform a targeted audit,
which allows inspection of small parts of the code identified by these
steps.
On 28/07/2021 9:12 am, Peter Firmstone wrote:
Our process for establishing whether third party libraries are trusted
before we use them:
1. Bui
rs cat to bury applets.
Regards,
Peter.
On 28/07/2021 7:41 pm, fo...@univ-mlv.fr wrote:
*From: *"Peter Firmstone"
*To: *"Remi Forax" , "Alan Bateman"
*Cc: *"jdk-d
> From: "Peter Firmstone"
> To: "Remi Forax" , "Alan Bateman"
> Cc: "jdk-dev" , "security-dev"
>
> Sent: Wednesday, July 28, 2021 1:12:32 AM
> Subject: Re: How to remove the SecurityManager
> Thanks Remi,
> Sand-boxing
On 28/07/2021 9:12 am, Peter Firmstone wrote:
While its possible to use a dynamic proxy without downloading code,
via an atomic serialization connection, it's not generally advised to
do so with unauthenticated users, decisions around dynamic discovery,
whether class loading or downloads are a
n 28/07/2021 5:52 am, fo...@univ-mlv.fr wrote:
- Original Message -----
From: "Alan Bateman"
To: "Remi Forax" , "Peter Firmstone"
Sent: Tuesday, July 27, 2021 6:33:25 PM
Subject: Re: How to remove the SecurityManager
On 27/07/2021 17:11, Remi Forax wrote:
Peter,