Re: How NSA access was built into Windows

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2007-01-18 at 23:55 +0800, Ed Greshko wrote:
> If you guys really want to continue this silly ass thread I can create a
> mailing list for your enjoyment.
> 
> Let me know, and I can create a list for all of you and subscribe all of you
> and you can continue this endless exchange.
> 
Hi, Ed,
	This is indeed an endless exchange, but a valuable one at that.  For
example a quote from the NSA paper that Dr. Smalley was a part of:

By arguing that secure operating systems are indispensable to system
security, the authors hope to spawn a renewed interest in operating
system security. If security practitioners were to more openly
acknowledge their security solution’s operating system dependencies and
state these dependencies as requirements for future operating systems,
then the increased demand for secure operating systems would lead to new
research and development in the area and ultimately to commercially
viable secure systems. In turn, the availability of secure operating
systems would enable security practitioners to concentrate on security
services that belong in their particular components rather than dooming
them to try to address the total security problem with no hope of
success. (http://www.nsa.gov/selinux/papers/inevitability/)

Gives us a view that this topic must continue to be given air time.  It
is vital to users and customers of users of computing architectures, not
just Linux, but all operating systems.

I hope that our discussion, while sometimes vitrolic and often arcane,
brings all of you to thinking about the issues of data and system
protection.  It is vital to the network that "no system" not a server,
nor a user workstation, be unprotected from malicious use.  Moreover, it
is important that mechanisms exist to report violations of that security
to parties that will endeavor to close the holes that permitted that
violation to occur, and to parties that will seek out and punish those
that violated that security world wide.

Regards,
Les H




[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora Magazine]     [Fedora News]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux