pem-dev
[Top] [All Lists]

Re: Gopher use of PEM

1993-11-11 04:05:00
           Use of Privacy Enhanced Mail by Gopher

Great idea. Gives a neat packaging for one of the problems that has been
worrying me for years, and is one of the main reasons I've kept on
watching this interminable process. I get worried by the ease of issuing a
trojan horse by modifying a bit of software that is highly popular and
runs privileged. Consider the VMS ANU news program, which runs as
privileged. I know that the VAX where the source code was held was hacked;
I was assuresd by the author they did not change anything, but how did he
know, and how do I know the source I get from IC is the same? Using
signatures seems to be the way, and your mechanism provides a neat tool. 

We also need a ftp version of the same thing. Initially text only, then
extended to include binary files.

--
Chris Rusbridge
Director of Information Technology Services
University of Dundee, Dundee DD1 4HN, Scotland
Internet:       C(_dot_)A(_dot_)Rusbridge(_at_)dundee(_dot_)ac(_dot_)uk
Telephone:      +44 382 34 4444          Fax: +44 382 28649

<Prev in Thread] Current Thread [Next in Thread>
  • Gopher use of PEM, Mike Roe
    • Re: Gopher use of PEM, C.A. Rusbridge Information Technology Services ext 4444 <=