etoys now available in Debian's non-free repository

Jim Gettys jg at laptop.org
Sat Jun 21 14:50:59 EDT 2008


On Sat, 2008-06-21 at 08:47 -0400, Frank Ch. Eigler wrote:

> 
> Plus it requires them (and users) to run the tools embedded into the
> possibly suspect image in order to describe itself.  Do you see how
> there could be a trust problem there?
> 

Note this is no different than any time you use a compiler binary
provided by someone else...  The attack is just as complete...

http://cm.bell-labs.com/who/ken/trust.html
                    - Jim

-- 
Jim Gettys <jg at laptop.org>
One Laptop Per Child




More information about the Devel mailing list