2008/12/18 Arne Babenhauserheide <arne_...@web.de>:
> Am Donnerstag 18 Dezember 2008 16:03:39 schrieb Michal Suchanek:
>> > Only if you assume that "security that is actually usable" implies
>> > hiding things from the parent process. As I already explained, we
>> > believe this assumption to be fundamentally wrong. Get over it.
>>
>> As I said numerous times hiding things from child process can be
>> turned into hiding things from parent process. After all, your login
>> shell is normally started by some other service which has all the
>> power to hide things from it. The only difference we are discussing
>> round and round is whether this service is configured to possibly hide
>> something from all shells or if there is a 'root' shell that can
>> access everything.
>
> Then let's put it simple: If a system is designed to make it hard for the
> admin (the one who controls the actual hard disk and can poke every bit in
> there, using a LiveCD if need be), then it is designed for slavery.
>
> And from what I now learned, that's the case for Coyotos.
>

Which part of Coyotos design is that? I have not heard of it so far so
enlighten me, please.

Thanks

Michal


Reply via email to