2008/12/18 Arne Babenhauserheide <arne_...@web.de>: > Am Donnerstag 18 Dezember 2008 16:03:39 schrieb Michal Suchanek: >> > Only if you assume that "security that is actually usable" implies >> > hiding things from the parent process. As I already explained, we >> > believe this assumption to be fundamentally wrong. Get over it. >> >> As I said numerous times hiding things from child process can be >> turned into hiding things from parent process. After all, your login >> shell is normally started by some other service which has all the >> power to hide things from it. The only difference we are discussing >> round and round is whether this service is configured to possibly hide >> something from all shells or if there is a 'root' shell that can >> access everything. > > Then let's put it simple: If a system is designed to make it hard for the > admin (the one who controls the actual hard disk and can poke every bit in > there, using a LiveCD if need be), then it is designed for slavery. > > And from what I now learned, that's the case for Coyotos. >
Which part of Coyotos design is that? I have not heard of it so far so enlighten me, please. Thanks Michal