On Sat, Dec 03, 2005 at 10:45:02AM +1300, Nick FitzGerald wrote: > Jan Nielsen wrote: > > > That question opens up a whole lotta other questions, really depends on > > what you hope to achieve by doing authentication via a compromised system. > > In my book you should instead try to detect a compromised system and deny > > them access if they are indeed compromised, ... > > Obviously, then, your book does not include the phrase "Halting > Problem"...
Do you just mean that you think this is an undecidable issue, or is there some stronger or more directly applicable lesson to be learned here from the Halting Problem? --Foofus. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/