I can't see how someone can deny access to the network, while still 
allowing 
    anyone's software to be run on the device, without some sort of key system 
in 
    the networking hardware - is that what you had in mind?

This is aimed at cell phone networks: it recognizes they are allowed
to make the network refuse to talk to a phone if the users's changes
cause the phone to screw up the network.

_______________________________________________
U-Boot mailing list
U-Boot@lists.denx.de
http://lists.denx.de/mailman/listinfo/u-boot

Reply via email to