[Previous] [Next] [Index] [Thread]

Re: what are realistic threats?



>OK.  What about trojan horses in
>a) ncsa mosaic?
>b) ghostview?
>c) any or all of X?
>d) an http server?
>e) emacs/wordperfect/ms word?
>f) etc etc

This is why I think we need a standalone certificate scheme. The program may
reside on any server but has a certificate signed by the producer. Although
single rooted authentication hierarchies have problems most people would trust
the signature if signed by USGovt, MIT, W3O, AMEX and Peter Wright.

Phill. 


Follow-Ups: References: