On Fri, 26 Jul 2002, Ed Wilts wrote:

> And while it's running, the user simply copies the file out of /tmp and
> your encryption is shot.

Well, he *could* futz with file permissions, but you're essentially right.  
This is why closed-source security solutions are almost always bad ju-ju:  
no peer review. Still, his idea isn't any less commercially viable than
most of the other snake oil out there. Caveat emptor.

-- 
"The only thing that helps me maintain my slender grip on reality is the
friendship I share with my collection of singing potatoes."

                        - Holly, JMC Vessel *Red Dwarf*



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to