On Sat, Dec 03, 2005 at 10:45:02AM +1300, Nick FitzGerald wrote:
> Jan Nielsen wrote:
> 
> > That question opens up a whole lotta other questions, really depends on
> > what you hope to achieve by doing authentication via a compromised system.
> > In my book you should instead try to detect a compromised system and deny
> > them access if they are indeed compromised, ...
> 
> Obviously, then, your book does not include the phrase "Halting 
> Problem"...

Do you just mean that you think this is an undecidable issue, or is 
there some stronger or more directly applicable lesson to be learned 
here from the Halting Problem?

--Foofus.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to