From mboxrd@z Thu Jan 1 00:00:00 1970 Path: news.gmane.org!not-for-mail From: William ML Leslie Newsgroups: gmane.lisp.guile.devel Subject: Re: Dijkstra's Methodology for Secure Systems Development Date: Sat, 20 Sep 2014 23:53:46 +1000 Message-ID: References: NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: multipart/alternative; boundary=001a113a9d62eb07a605037f8bf2 X-Trace: ger.gmane.org 1411221254 14226 80.91.229.3 (20 Sep 2014 13:54:14 GMT) X-Complaints-To: usenet@ger.gmane.org NNTP-Posting-Date: Sat, 20 Sep 2014 13:54:14 +0000 (UTC) To: guile-devel Original-X-From: guile-devel-bounces+guile-devel=m.gmane.org@gnu.org Sat Sep 20 15:54:06 2014 Return-path: Envelope-to: guile-devel@m.gmane.org Original-Received: from lists.gnu.org ([208.118.235.17]) by plane.gmane.org with esmtp (Exim 4.69) (envelope-from ) id 1XVL6z-0008Tc-QM for guile-devel@m.gmane.org; Sat, 20 Sep 2014 15:54:06 +0200 Original-Received: from localhost ([::1]:34692 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1XVL6z-0004gr-GH for guile-devel@m.gmane.org; Sat, 20 Sep 2014 09:54:05 -0400 Original-Received: from eggs.gnu.org ([2001:4830:134:3::10]:47740) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1XVL6s-0004cl-0z for guile-devel@gnu.org; Sat, 20 Sep 2014 09:53:58 -0400 Original-Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1XVL6q-0002Vm-RJ for guile-devel@gnu.org; Sat, 20 Sep 2014 09:53:57 -0400 Original-Received: from mail-qa0-x22d.google.com ([2607:f8b0:400d:c00::22d]:54685) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1XVL6q-0002Mf-Ml for guile-devel@gnu.org; Sat, 20 Sep 2014 09:53:56 -0400 Original-Received: by mail-qa0-f45.google.com with SMTP id s7so3744296qap.18 for ; Sat, 20 Sep 2014 06:53:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=KL6MjxWYOGFhj+yMtkz7zK2gzmPo6yN9iO7S3slSs/Y=; b=qgWN5GnnitEI8k7AlMfFMLBGrON1ZFc5qrqQNYbBvfM9HpvuQS9Znw6lP1qpdqhVcF e8UCeJyFIfNsZMFhaqnhZm4fjq6EQkFjlX/ixt12zGaDmHZ2CYinNbqUcUTOhRFovGmL mDyEtlolDm8jRGG4XkpGoijSurEHAZlsQzfkDCwtTTjH2fSHuzyoueWmRecxCFflvC+g JccpBhw7Qh23grzTuG/mUjTtu07vaCrrVzRCCITRiDrSQvUs3abM4L1NU1DnJdius7gG tSbToW2QcBVml15wTshY5CZNhlVJtX2ac2HzuR8VeYntBcPACI1JKMoSr2CmALQmFR7+ a1sg== X-Received: by 10.140.105.53 with SMTP id b50mr8577280qgf.36.1411221226717; Sat, 20 Sep 2014 06:53:46 -0700 (PDT) Original-Received: by 10.140.241.216 with HTTP; Sat, 20 Sep 2014 06:53:46 -0700 (PDT) In-Reply-To: X-detected-operating-system: by eggs.gnu.org: Error: Malformed IPv6 address (bad octet value). X-Received-From: 2607:f8b0:400d:c00::22d X-BeenThere: guile-devel@gnu.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: "Developers list for Guile, the GNU extensibility library" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guile-devel-bounces+guile-devel=m.gmane.org@gnu.org Original-Sender: guile-devel-bounces+guile-devel=m.gmane.org@gnu.org Xref: news.gmane.org gmane.lisp.guile.devel:17498 Archived-At: --001a113a9d62eb07a605037f8bf2 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 20 September 2014 18:50, Panicz Maciej Godek wrote: > > =E2=80=8B=E2=80=8B > And I still find it difficult to see anything terrible in the idea that > "FSF had been subverted", when I interpret that in terms of software > security, because the way I see it, the main premise of FSF movement is t= o > share the code (as opposed to restricting it), and the main goal of the G= NU > Operating System is to propagate that idea, rather than to provide a secu= re > and reliable operating system (which are only secondary goals that are > needed to be fulfilled in order for the operating system to become popula= r, > respected and desired -- or to advertise the idea well enough). > The GNU exists to enable users to have control and power over the computers they own. Proprietary software is one mechanism to subvert that right; security flaws in the mechanisms we use to run software from other sources is another, and it is an important one because most people use a lot of software they don't have time to audit. Improving the security of the platform is *key* to the goals of the GNU, but not only is it a long road, it's not clear yet which paths are well lit. --=20 William Leslie Notice: Likely much of this email is, by the nature of copyright, covered under copyright law. You absolutely MAY reproduce any part of it in accordance with the copyright law of the nation you are reading this in. Any attempt to DENY YOU THOSE RIGHTS would be illegal without prior contractual agreement. --001a113a9d62eb07a605037f8bf2 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
On 20 September 2014 18:50, Pan= icz Maciej Godek <godek.maciek@gmail.com> wrote:
<= div dir=3D"ltr">
=E2=80=8B=E2=80=8B
And I still f= ind it difficult to see anything terrible in the idea that "FSF had be= en subverted", when I interpret that in terms of software security, be= cause the way I see it, the main premise of FSF movement is to share the co= de (as opposed to restricting it), and the main goal of the GNU Operating S= ystem is to propagate that idea, rather than to provide a secure and reliab= le operating system (which are only secondary goals that are needed to be f= ulfilled in order for the operating system to become popular, respected and= desired -- or to advertise the idea well enough).
=

The GNU exists to enable users to have control and power over the co= mputers they own.=C2=A0 Proprietary software is one mechanism to subvert th= at right; security flaws in the mechanisms we use to run software from othe= r sources is another, and it is an important one because most people use a = lot of software they don't have time to audit.=C2=A0 Improving the secu= rity of the platform is *key* to the goals of the GNU, but not only is it a= long road, it's not clear yet which paths are well lit.
=C2= =A0
--
William Leslie

Notice:
Likely much of t= his email is, by the nature of copyright, covered under copyright law. =C2= =A0You absolutely MAY reproduce any part of it in accordance with the copyr= ight law of the nation you are reading this in. =C2=A0Any attempt to DENY Y= OU THOSE RIGHTS would be illegal without prior contractual agreement. --001a113a9d62eb07a605037f8bf2--