1993-10-07 - Re: Crypto Toolkit Suggestions

Header Data

From: “Phil G. Fraering” <pgf@srl.cacs.usl.edu>
To: cypherpunks@toad.com
Message Hash: 51382ea3edc2cead770886762bf3677465fcadb3353e6b14815d7e4feed4f950
Message ID: <199310070031.AA09974@srl03.cacs.usl.edu>
Reply To: N/A
UTC Datetime: 1993-10-07 00:35:32 UTC
Raw Date: Wed, 6 Oct 93 17:35:32 PDT

Raw message

From: "Phil G. Fraering" <pgf@srl.cacs.usl.edu>
Date: Wed, 6 Oct 93 17:35:32 PDT
To: cypherpunks@toad.com
Subject: Re:  Crypto Toolkit Suggestions
Message-ID: <199310070031.AA09974@srl03.cacs.usl.edu>
MIME-Version: 1.0
Content-Type: text/plain

Re: Hiding processes and data via subordinate processes, variables,
et cetera... it will probably be a _lot_ better and easier to
simply assume that a multi-user unix system isn't secure to
begin with, and work out alternatives from there.