Thoughts on droplets

Ben Laurie ben@algroup.co.uk
Tue, 02 Nov 1999 08:47:57 +0000


shapj@us.ibm.com wrote:
> 3. A mechanism by which one machine may verify that the other's kernel is
> trusted.
> 
> The last two problems can be solved by use of a number of hardware add-in
> cards.

It can? I'm intrigued ... how would one detect the other guy's kernel
running on an emulator that is going to do something nasty only after
the kernel verification?

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

"My grandfather once told me that there are two kinds of people: those
who work and those who take the credit. He told me to try to be in the
first group; there was less competition there."
     - Indira Gandhi