From: mrm@netcom.com (Marianne Mueller)
To: llurch@networking.stanford.edu (Rich Graves)
Message Hash: b39e1624643d6befb1ad1e3ee066cb5a53d2d246d24948467797638ae12afe76
Message ID: <199604272256.PAA02672@netcom20.netcom.com>
Reply To: <Pine.GUL.3.93.960424222517.22644F-100000@Networking.Stanford.EDU>
UTC Datetime: 1996-04-28 04:39:29 UTC
Raw Date: Sun, 28 Apr 1996 12:39:29 +0800
From: mrm@netcom.com (Marianne Mueller)
Date: Sun, 28 Apr 1996 12:39:29 +0800
To: llurch@networking.stanford.edu (Rich Graves)
Subject: Re: Mindshare and Java
In-Reply-To: <Pine.GUL.3.93.960424222517.22644F-100000@Networking.Stanford.EDU>
Message-ID: <199604272256.PAA02672@netcom20.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
One thing I don't understand, why do you trust signed code?
So you know the code is signed by Jack the Ripper. so what? How do
decide what you want the code to be allowed to do? I think there's
nothing for it but a kind of limited capabilities model built on top
of the authentication mechanism.
Marianne
Return to April 1996
Return to ““Vladimir Z. Nuri” <vznuri@netcom.com>”