[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Design principles
From: |
Pierre THIERRY |
Subject: |
Re: Design principles |
Date: |
Tue, 16 Jan 2007 06:21:27 +0100 |
User-agent: |
Mutt/1.5.13 (2006-08-11) |
Scribit Marcus Brinkmann dies 15/01/2007 hora 18:26:
> Well, in this case I have the upper hand in the discussion, because we
> definitely have exciting and convincing evidence that mutually
> suspicious collaboration can and will happen in transparent computer
> systems.
A very narrow kind of mutually suspicious collaboration. The "canonical"
example of it used several times seems impossible to achieve to me:
subject A wants to give B authority to use code without giving authority
to inspect it (secret algorithm) while B doesn't want to give A any
authority to the data that will be processed.
Controversially,
Pierre
--
address@hidden
OpenPGP 0xD9D50D8A
signature.asc
Description: Digital signature
- Re: Design principles, (continued)
- Re: Design principles, Jonathan S. Shapiro, 2007/01/15
- Re: Design principles, Marcus Brinkmann, 2007/01/15
- Re: Design principles, Jonathan S. Shapiro, 2007/01/15
- Re: Design principles, Neal H. Walfield, 2007/01/15
- Re: Design principles, Jonathan S. Shapiro, 2007/01/15
- Re: Design principles, Marcus Brinkmann, 2007/01/15
- Re: Design principles, Jonathan S. Shapiro, 2007/01/15
- Re: Design principles, Sam Mason, 2007/01/15
- Re: Design principles, Neal H. Walfield, 2007/01/15
- Re: Design principles, Sam Mason, 2007/01/15
- Re: Design principles,
Pierre THIERRY <=
Re: Design principles, Pierre THIERRY, 2007/01/15
Re: Design principles, Pierre THIERRY, 2007/01/16