Talk:Bitfrost: Difference between revisions

From OLPC
Jump to navigation Jump to search
No edit summary
No edit summary
Line 10: Line 10:
If you start your design of new security model with such false assumptions your
If you start your design of new security model with such false assumptions your
results may be still right at the end - or may be not.
results may be still right at the end - or may be not.

--

I can't edit this page (wtf?) so I'll just complain. Please STOP using the female pronoun in an attempt to be politically correct. If you don't like the male pronoun, fine, use non-gender specific pronouns.. english has lots of them.

Revision as of 23:04, 7 February 2007

The author describes some vesion of typical Unix permissions and security model behind it and then complains that with this model "we can't stop viruses and malware" and that "anyone can send a user an executable program, and for many years the users' instinctive reaction was to open the attachment and run the program." The reality is quite different really. I use Unix systems since 15+ years. My machines were never eaten by a virus and I never have run a program directly from an attachment. The only problem with e-mail viruses is that they add to spam but it is very easy to filter viruses anyway.

If you start your design of new security model with such false assumptions your results may be still right at the end - or may be not.