> Any updates or thoughts?

[I watched the talk but not all the Q&A.]

I think our efforts would be much more productive helping to deploy NTS.

They are trying to protect against MitM attacks, but they assume that only 
some of the servers can be attacked.  That misses the important case where the 
bad guy can attack all your packets.

It depends on a large pool.  From a security standpoint, keeping the bad guys 
out of the pool is impossible.  (or at least an interesting research project, 
probably for lawyers rather than geeks)

They are reinventing the wheel.  What should you do with good samples?  That 
area of our code is incredibly complicated, but it has a long track record.  
She said "average" without saying anything more.  Maybe the paper has more 
details.

We could start an interesting project on what to do with "good" samples.


-- 
These are my opinions.  I hate spam.



_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to