I propose that we change the subject line on this discussion.

Can somebody remind me how, in a system providing only translucent
storage allocation, one can safely manage the private portion of a
cryptographic key?

I do remember that we discussed this. I do not remember what the
proposed resolution was.
-- 
Jonathan S. Shapiro, Ph.D.
Managing Director
The EROS Group, LLC
+1 443 927 1719 x5100



_______________________________________________
L4-hurd mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/l4-hurd

Reply via email to