Talk:Bitfrost: Difference between revisions
Jump to navigation
Jump to search
(doubless assumptions) |
m (omission) |
||
Line 8: | Line 8: | ||
add to spam but it is very easy to filter viruses anyway. |
add to spam but it is very easy to filter viruses anyway. |
||
If you start your design of new security model |
If you start your design of new security model with such false assumptions your |
||
the end - or may be not. |
results may be still right at the end - or may be not. |
Revision as of 21:15, 7 February 2007
The author describes some vesion of typical Unix permissions and security model behind it and then complains that with this model "we can't stop viruses and malware" and that "anyone can send a user an executable program, and for many years the users' instinctive reaction was to open the attachment and run the program." The reality is quite different really. I use Unix systems since 15+ years. My machines were never eaten by a virus and I never have run a program directly from an attachment. The only problem with e-mail viruses is that they add to spam but it is very easy to filter viruses anyway.
If you start your design of new security model with such false assumptions your results may be still right at the end - or may be not.