Re: authenticating intrahost crypto providers
At 11:37 AM 1/18/96 EST, James Leppek wrote:
I have been doing some research on the development of an abstract security services API(not just a CAPI) and have hit a road block. The problem revolves around the need to authenticate a security service provider to an application.
No such need. If the attacker can introduce his own module to supply crypto services then he must have administrator (NT equivalent of root) privileges, in which case your are stuffed regardless. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd@echeque.com
I remember once reading in cypherppunks about how the US government used counterfeit money as an economic warfare tool against Iraq during the war. Can anyone give me anymore pointers to this? Is it comfirmed? If you feel this is of topic, pleasea email me personally. ------------------------------------------------------------------------------- Patiwat Panurach Whatever you can do, or dream you can, begin it. eMAIL: pati@ipied.tu.ac.th Boldness has genius, power and magic in it. m/18 junior Fac of Economics -Johann W.Von Goethe -------------------------------------------------------------------------------
participants (2)
-
James A. Donald -
Patiwat Panurach (akira rising)