From: “L. Todd Masco” <cactus@bb.com>
To: cypherpunks@toad.com
Message Hash: 340bda00dad17efde60554b97a6736d2d97ad9cf905025f9926e255b14e91089
Message ID: <199408292254.SAA09291@bb.com>
Reply To: <199408292212.SAA08717@bb.com>
UTC Datetime: 1994-08-29 22:50:05 UTC
Raw Date: Mon, 29 Aug 94 15:50:05 PDT
From: "L. Todd Masco" <cactus@bb.com>
Date: Mon, 29 Aug 94 15:50:05 PDT
To: cypherpunks@toad.com
Subject: Re: Announcing Bellcore's Trusted Software Integrity (Betsi) System
In-Reply-To: <199408292212.SAA08717@bb.com>
Message-ID: <199408292254.SAA09291@bb.com>
MIME-Version: 1.0
Content-Type: text/plain
Jim Gillogly writes:
> Mark Ludwig wrote KOH, an on-the-fly disk encryption program that is also
> a virus. It was posted recently to alt.security.pgp. Ludwig is the author
> of a number of other viruses that don't claim to be useful.
I stand corrected; However, my point (overstated as it was) is that this
is insignificant to the total number of programs distributed: the whole
mass of ftp.uu.net, wuarchive.wustl.edu,...
> OK. For the record, I think it's a Good Thing to have as much confidence
> in lots of different frequent-version programs as I do in (say) PGP with
> its signed-file protocols.
Oh, I certainly agree. I just don't believe that Betsi does anything
constructive towards this -- doing this through reputations of known
agents is a much better method, IMO -- and not one that requires an
agent <-> human mapping.
--
L. Todd Masco | "Which part of 'shall not be infringed' didn't
cactus@bb.com | you understand?"
Return to August 1994
Return to ““L. Todd Masco” <cactus@bb.com>”