Am Dienstag 30 Dezember 2008 16:48:53 schrieb Michal Suchanek: > > Yes they have, because with a treacherous design, they can use my free > > tools to create parts I can't access. > > Yes, and the tools required are memory protection and a hardware > cryptography device both of which are present in most current systems. > > So we are back to all systems being treacherous by design.
No, because I can make my system lie to them because I am root - and that's good. If they expect some driver for accessing the cryptographic device, I just install a fake driver which tells them what they want to hear. With Coyotos that would be far harder because protection against root is built into its core design. We already discussed this, no need to go at it again. Best wishes, Arne -- -- My stuff: http://draketo.de - stories, songs, poems, programs and stuff :) -- Infinite Hands: http://infinite-hands.draketo.de - singing a part of the history of free software. -- Ein Würfel System: http://1w6.org - einfach saubere (Rollenspiel-) Regeln. -- PGP/GnuPG: http://draketo.de/inhalt/ich/pubkey.txt
signature.asc
Description: This is a digitally signed message part.