etoys now available in Debian's non-free repository
Jim Gettys
jg at laptop.org
Sat Jun 21 14:50:59 EDT 2008
On Sat, 2008-06-21 at 08:47 -0400, Frank Ch. Eigler wrote:
>
> Plus it requires them (and users) to run the tools embedded into the
> possibly suspect image in order to describe itself. Do you see how
> there could be a trust problem there?
>
Note this is no different than any time you use a compiler binary
provided by someone else... The attack is just as complete...
http://cm.bell-labs.com/who/ken/trust.html
- Jim
--
Jim Gettys <jg at laptop.org>
One Laptop Per Child
More information about the Devel
mailing list