Re: Content security model

On 25 July 2012 18:00, Phillip Hallam-Baker <hallam@gmail.com> wrote:
> A trusted intermediary can do anything it likes and the recipient will
> accept the data (provided that the trusted intermediary
> re-authenticates it)

Well, there is trust and then there is trust.  I might trust an
intermediary to look at my data to determine if it contains bad stuff,
but I might not trust it to modify it.  One problem with the current
system is that you don't get to choose.

Received on Thursday, 26 July 2012 15:53:02 UTC