infobot has quit [Read error: Connection reset by peer]
infobot has joined #neo900
chomwitt has quit [Quit: WeeChat 1.0.1]
preview has joined #neo900
preview has quit [Remote host closed the connection]
knttl has quit [Ping timeout: 256 seconds]
himcesjf_ is now known as him-cesjf
knttl has joined #neo900
pagurus has quit [Ping timeout: 240 seconds]
pagurus has joined #neo900
ArturShaik has joined #neo900
paulk-gagarine-s has joined #neo900
paulk-gagarine has quit [Ping timeout: 250 seconds]
preview has joined #neo900
ArturShaik has quit [Ping timeout: 256 seconds]
chomwitt has joined #neo900
Kabouik- has joined #neo900
Kabouik_ has quit [Ping timeout: 240 seconds]
Pali has joined #neo900
xes has quit [Ping timeout: 264 seconds]
preview has quit [Remote host closed the connection]
preview has joined #neo900
xes has joined #neo900
xes has quit [Ping timeout: 240 seconds]
xes has joined #neo900
houkime has joined #neo900
paulk-gagarine-s has quit [Quit: Leaving]
paulk-gagarine has joined #neo900
qwazix has quit [Remote host closed the connection]
sicelo has quit [Ping timeout: 264 seconds]
sicelo has joined #neo900
ArturShaik has joined #neo900
wicket64 has quit [Ping timeout: 256 seconds]
wicket64 has joined #neo900
ArturShaik has quit [Ping timeout: 255 seconds]
ArturShaik has joined #neo900
__Chris has joined #neo900
Chris_ has quit [Ping timeout: 256 seconds]
xmn has joined #neo900
<Joerg-Neo900>
>>When the keys are kept secret by the manufacturer of the device or the platform, the whole security model of the device is delegated to this third party. The user cannot decide of their own security model and consider potential threats based on their own situation, that may not set this third party as a fully trusted peer. Instead, the implemented security model only covers this third party's threat model, that is designed to consider the
<Joerg-Neo900>
O may add: and when the keys are disclosed to the user, then this whole security model has no obvious advantage over the classical user permissions model based on a root user and unprivileged nprmal users. But introduces lots of complexity
<Joerg-Neo900>
I*
<Joerg-Neo900>
plus such security model (disclosed key) actually *introduces new* threats compared to the classical one, since users are deceived into trusting that signature to protect them, while indeed there's prolly zilch protection when malicious hackers could get hold of the keys as well. Now when your developer trust in that signature model, they might be less diligent in implementing the classical proven models