On Thu, Aug 14, 2008 at 2:06 PM, Florent Daignière
<[EMAIL PROTECTED]> wrote:
>
> As I was explaining to toad on IRC it's not a matter of threat level but
> threat model:
>        - is the presumed attacker monitoring the network?
>        - is it possible for him to seize the datastore?
>        - what kind of resource do we assume he has access to?

Fine, but we need to infer these things by asking the user simple
questions that they will understand and answer correctly.

Ian.

-- 
Ian Clarke
CEO, Uprizer Labs
Email: [EMAIL PROTECTED]
Cell: +1 512 422 3588
_______________________________________________
Devl mailing list
Devl@freenetproject.org
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to