houkime has quit [Ping timeout: 260 seconds]
infobot has quit [Read error: Connection reset by peer]
infobot has joined #neo900
chomwitt has quit [Quit: WeeChat 1.0.1]
preview has joined #neo900
preview has quit [Remote host closed the connection]
knttl has quit [Ping timeout: 256 seconds]
himcesjf_ is now known as him-cesjf
knttl has joined #neo900
pagurus has quit [Ping timeout: 240 seconds]
pagurus has joined #neo900
ArturShaik has joined #neo900
paulk-gagarine-s has joined #neo900
paulk-gagarine has quit [Ping timeout: 250 seconds]
preview has joined #neo900
ArturShaik has quit [Ping timeout: 256 seconds]
chomwitt has joined #neo900
Kabouik- has joined #neo900
Kabouik_ has quit [Ping timeout: 240 seconds]
Pali has joined #neo900
xes has quit [Ping timeout: 264 seconds]
preview has quit [Remote host closed the connection]
preview has joined #neo900
xes has joined #neo900
xes has quit [Ping timeout: 240 seconds]
xes has joined #neo900
houkime has joined #neo900
paulk-gagarine-s has quit [Quit: Leaving]
paulk-gagarine has joined #neo900
qwazix has quit [Remote host closed the connection]
sicelo has quit [Ping timeout: 264 seconds]
sicelo has joined #neo900
ArturShaik has joined #neo900
wicket64 has quit [Ping timeout: 256 seconds]
wicket64 has joined #neo900
ArturShaik has quit [Ping timeout: 255 seconds]
ArturShaik has joined #neo900
__Chris has joined #neo900
Chris_ has quit [Ping timeout: 256 seconds]
xmn has joined #neo900
<Joerg-Neo900> >>When the keys are kept secret by the manufacturer of the device or the platform, the whole security model of the device is delegated to this third party. The user cannot decide of their own security model and consider potential threats based on their own situation, that may not set this third party as a fully trusted peer. Instead, the implemented security model only covers this third party's threat model, that is designed to consider the
<Joerg-Neo900> O may add: and when the keys are disclosed to the user, then this whole security model has no obvious advantage over the classical user permissions model based on a root user and unprivileged nprmal users. But introduces lots of complexity
<Joerg-Neo900> I*
<Joerg-Neo900> plus such security model (disclosed key) actually *introduces new* threats compared to the classical one, since users are deceived into trusting that signature to protect them, while indeed there's prolly zilch protection when malicious hackers could get hold of the keys as well. Now when your developer trust in that signature model, they might be less diligent in implementing the classical proven models
wiewo has quit [Ping timeout: 260 seconds]
wiewo has joined #neo900
<Joerg-Neo900> ~trust
<infobot> somebody said trust was safe, or http://www.youtube.com/watch?v=0cbS_lDJuJg
_whitelogger has joined #neo900
wicket64 has quit [*.net *.split]
xes has quit [*.net *.split]
knttl has quit [*.net *.split]
MonkeyofDoom has quit [*.net *.split]
M-DzzzzzzR has quit [*.net *.split]
MonkeyofDoom has joined #neo900
knttl has joined #neo900
xes has joined #neo900
wicket64 has joined #neo900
M-DzzzzzzR has joined #neo900
ArturShaik has quit [Ping timeout: 276 seconds]
xes has quit [Quit: bye..]
xes has joined #neo900
Pali has quit [Remote host closed the connection]
himcesjf_ has joined #neo900
him-cesjf has quit [Ping timeout: 264 seconds]
xmn has quit [Ping timeout: 276 seconds]
rofl_ is now known as jcarpenter2