On Thu, Aug 14, 2008 at 2:06 PM, Florent Daigni?re
<nextgens at freenetproject.org> wrote:
>
> As I was explaining to toad on IRC it's not a matter of threat level but
> threat model:
>        - is the presumed attacker monitoring the network?
>        - is it possible for him to seize the datastore?
>        - what kind of resource do we assume he has access to?

Fine, but we need to infer these things by asking the user simple
questions that they will understand and answer correctly.

Ian.

-- 
Ian Clarke
CEO, Uprizer Labs
Email: ian at uprizer.com
Cell: +1 512 422 3588

Reply via email to