1996-04-28 - Re: Mindshare and Java

Header Data

From: mrm@netcom.com (Marianne Mueller)
To: llurch@networking.stanford.edu (Rich Graves)
Message Hash: b39e1624643d6befb1ad1e3ee066cb5a53d2d246d24948467797638ae12afe76
Message ID: <199604272256.PAA02672@netcom20.netcom.com>
Reply To: <Pine.GUL.3.93.960424222517.22644F-100000@Networking.Stanford.EDU>
UTC Datetime: 1996-04-28 04:39:29 UTC
Raw Date: Sun, 28 Apr 1996 12:39:29 +0800

Raw message

From: mrm@netcom.com (Marianne Mueller)
Date: Sun, 28 Apr 1996 12:39:29 +0800
To: llurch@networking.stanford.edu (Rich Graves)
Subject: Re: Mindshare and Java
In-Reply-To: <Pine.GUL.3.93.960424222517.22644F-100000@Networking.Stanford.EDU>
Message-ID: <199604272256.PAA02672@netcom20.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


One thing I don't understand, why do you trust signed code? 

So you know the code is signed by Jack the Ripper.  so what?  How do 
decide what you want the code to be allowed to do?   I think there's 
nothing for it but a kind of limited capabilities model built on top
of the authentication mechanism. 

Marianne






Thread