Talk:Bitfrost: Difference between revisions
(Sexist Article) |
(what about reinstall) |
||
Line 10: | Line 10: | ||
If you start your design of new security model with such false assumptions your |
If you start your design of new security model with such false assumptions your |
||
results may be still right at the end - or may be not. |
results may be still right at the end - or may be not. |
||
== One Brick per child? == |
|||
"The sole purpose of these keys will be to verify the integrity of bundled software and content" - what is five years down the line, the child has got bored of Squeak etc and decides to install a different Linux distro, will the DRM brick the laptop? |
|||
== Sexist Article == |
== Sexist Article == |
Revision as of 00:11, 8 February 2007
The author describes some vesion of typical Unix permissions and security model behind it and then complains that with this model "we can't stop viruses and malware" and that "anyone can send a user an executable program, and for many years the users' instinctive reaction was to open the attachment and run the program." The reality is quite different really. I use Unix systems since 15+ years. My machines were never eaten by a virus and I never have run a program directly from an attachment. The only problem with e-mail viruses is that they add to spam but it is very easy to filter viruses anyway.
If you start your design of new security model with such false assumptions your results may be still right at the end - or may be not.
One Brick per child?
"The sole purpose of these keys will be to verify the integrity of bundled software and content" - what is five years down the line, the child has got bored of Squeak etc and decides to install a different Linux distro, will the DRM brick the laptop?
Sexist Article
Author refers to user in the feminine sense (she). Why not use non-gender-specific terminology such as they and their?