Crypto Toolkit Suggestions

Phil G. Fraering pgf at srl.cacs.usl.edu
Wed Oct 6 17:35:32 PDT 1993


Re: Hiding processes and data via subordinate processes, variables,
et cetera... it will probably be a _lot_ better and easier to
simply assume that a multi-user unix system isn't secure to
begin with, and work out alternatives from there.

Phil






More information about the cypherpunks-legacy mailing list