On Tue, 2006-02-14 at 08:49 -0600, Eric Rostetter wrote: > > What we're proposing basically is a system in which someone can purposefully > place a trojan horse or backdoor on all Fedora Legacy systems without any > one checking for it ahead of time. You call that security? Putting all your > eggs in your trust in one person rather than multiple people? That isn't > security... > If I'm not mistaken, the timeout period starts when there is a package for updates testing. We can't get to the updates testing package phase w/out somebody doing the first level QA which includes making sure the patch uses is a known good patch from at least some other vendor. So the plot to root all Legacy systems is going to have to start further up the food chain. -- Jesse Keating RHCE (geek.j2solutions.net) Fedora Legacy Team (www.fedoralegacy.org) GPG Public Key (geek.j2solutions.net/jkeating.j2solutions.pub)
Attachment:
signature.asc
Description: This is a digitally signed message part
-- fedora-legacy-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-legacy-list