[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: comments on client auth
At 09:48 AM 6/14/96 -0700, Hal wrote:
>Putting the root in the code is about as safe as you're going to get. If
>the root can be tampered with, the code could be tampered with as well.
That's true. My advocacy of the TIS/MOSS style comes from the ability of an
individual user to define as many roots as he wishes -- freeing us from a
single hierarchy.
+--------------------------------------------------------------------------+
|Carl M. Ellison cme@cybercash.com http://www.clark.net/pub/cme |
|CyberCash, Inc. http://www.cybercash.com/ |
|207 Grindall Street PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2 |
|Baltimore MD 21230-4103 T:(410) 727-4288 F:(410)727-4293 |
+--------------------------------------------------------------------------+