GNU, security, and RMS
weiser.pa at xerox.com
weiser.pa at xerox.com
Thu Jun 8 06:29:57 AEST 1989
See the commentary in this months CACM by Jim Morris. His point is that,
approximately, identification is the key thing, security is unnecessary
except in special military applications.
I like his way of thinking: computers and networks are like life, in life
there is no nature-enforced security, instead we rely on identification and
peer pressure for 99.999% of enforcement. Let's do computers the same way.
If the above interests you, read the commentary, don't just respond to my
short, distorted summary.
-mark
More information about the Comp.unix.wizards
mailing list