GNU, security, and RMS

weiser.pa at xerox.com weiser.pa at xerox.com
Thu Jun 8 06:29:57 AEST 1989


See the commentary in this months CACM by Jim Morris.  His point is that,
approximately, identification is the key thing, security is unnecessary
except in special military applications.

I like his way of thinking: computers and networks are like life, in life
there is no nature-enforced security, instead we rely on identification and
peer pressure for 99.999% of enforcement.  Let's do computers the same way.

If the above interests you, read the commentary, don't just respond to my
short, distorted summary.

-mark



More information about the Comp.unix.wizards mailing list