On Wed, 2003-10-01 at 11:43, Fred Van Andel wrote:
> P2P in general: 
> The content of the network needs to be tightly controlled. We are 
> dealing with source code here and the consequences of someone being 
> able to inject malicious code or malicious files into the network 
> would be unthinkable. Therefore ALL files on the network MUST be 
> vetted by a central server, and ONLY files allowed by the central 
> server would be allowed on the network. All files transfered over 
> the network MUST be checked to make sure that they match the 
> checksums of the authorized files.
Not sure I agree with you here.  On the contrary, you should have
distributed files, vetted across the network, and used to ensure
validity of the ones that may potentially have malicious files/codes.

Which is why we have mirrors today. :)  My 2 cents.

Ciao
ST Lim

--
[EMAIL PROTECTED] mailing list

Reply via email to