[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: comments on client auth



At 09:48 AM 6/14/96 -0700, Hal wrote:

>Putting the root in the code is about as safe as you're going to get.  If
>the root can be tampered with, the code could be tampered with as well.

That's true.  My advocacy of the TIS/MOSS style comes from the ability of an
individual user to define as many roots as he wishes -- freeing us from a
single hierarchy.



+--------------------------------------------------------------------------+
|Carl M. Ellison          cme@cybercash.com   http://www.clark.net/pub/cme |
|CyberCash, Inc.                              http://www.cybercash.com/    |
|207 Grindall Street           PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2 |
|Baltimore MD 21230-4103       T:(410) 727-4288     F:(410)727-4293        |
+--------------------------------------------------------------------------+