On 06/12/2015 03:05 PM, Valeri Galtsev wrote:
On Fri, June 12, 2015 3:54 pm, jd1008 wrote:
On 06/12/2015 02:32 PM, Valeri Galtsev wrote:
On Fri, June 12, 2015 3:20 pm, John R Pierce wrote:
On 6/12/2015 1:03 PM, Valeri Galtsev wrote:
But the bottom line is the same: in both cases you are executing
somebody's else code on your computer.
your computer is *ALWAYS* executing someone elses code, unless you
wrote
every line of code in it, including the BIOS and the firmware of all
the
attached devices.
Indeed. What was never mentioned in this thread is a chain of trust. The
level of trust to what you get from your system vendor, software vendors
(be they open source or proprietary) may be quite different from the
level
of trust to what you get when clicking on some web link inside some
search
page, or on some website (even if you visit the website often).
So, it is all about whom and what do you trust, and to what level can
you
afford to trust, and whether you are able to track the software code to
the code origin.
This all was what I implied when I said that short phrase which may look
ridiculously if taken literally - exactly as you pointed out -, but may
make sense if you take into account the chains of trust involved.
Valeri
The more you know, the less you trust :) :)
Read the article:
http://www.kaspersky.com
Please, don't advertize Kaspersky here, especially when we are talking
about trust. He is KGB guy (is, not was; the only way they retire from
KGB, CIA, MI-5, and others is dead, feet first dead).
Valeri
I am not advertising, so please do not accuse anyone of this!
Just citing evidence that infiltration of spyware and malware
is far more sophisticated than anyone knew.
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos