Use of Privacy Enhanced Mail by Gopher
Great idea. Gives a neat packaging for one of the problems that has been
worrying me for years, and is one of the main reasons I've kept on
watching this interminable process. I get worried by the ease of issuing a
trojan horse by modifying a bit of software that is highly popular and
runs privileged. Consider the VMS ANU news program, which runs as
privileged. I know that the VAX where the source code was held was hacked;
I was assuresd by the author they did not change anything, but how did he
know, and how do I know the source I get from IC is the same? Using
signatures seems to be the way, and your mechanism provides a neat tool.
We also need a ftp version of the same thing. Initially text only, then
extended to include binary files.
--
Chris Rusbridge
Director of Information Technology Services
University of Dundee, Dundee DD1 4HN, Scotland
Internet: C(_dot_)A(_dot_)Rusbridge(_at_)dundee(_dot_)ac(_dot_)uk
Telephone: +44 382 34 4444 Fax: +44 382 28649