On Fri, June 12, 2015 3:20 pm, John R Pierce wrote: > On 6/12/2015 1:03 PM, Valeri Galtsev wrote: >> But the bottom line is the same: in both cases you are executing >> somebody's else code on your computer. > > > your computer is *ALWAYS* executing someone elses code, unless you wrote > every line of code in it, including the BIOS and the firmware of all the > attached devices. > Indeed. What was never mentioned in this thread is a chain of trust. The level of trust to what you get from your system vendor, software vendors (be they open source or proprietary) may be quite different from the level of trust to what you get when clicking on some web link inside some search page, or on some website (even if you visit the website often). So, it is all about whom and what do you trust, and to what level can you afford to trust, and whether you are able to track the software code to the code origin. This all was what I implied when I said that short phrase which may look ridiculously if taken literally - exactly as you pointed out -, but may make sense if you take into account the chains of trust involved. Valeri ++++++++++++++++++++++++++++++++++++++++ Valeri Galtsev Sr System Administrator Department of Astronomy and Astrophysics Kavli Institute for Cosmological Physics University of Chicago Phone: 773-702-4247 ++++++++++++++++++++++++++++++++++++++++ _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos