I really would like the Android model to be elaborated on a fair bit.

Users should be able to deny apps privileges that they request.

Users should be able to label data with simple labels for additional
isolation (think of it as multiple instances of apps).

How does this relate to crypto?  Right, not at all, except through the
use of digital signatures strictly for continuity and pseudonymous
identification (public key == ID).

Nico
--
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to