Changes To Experiment: mmmv_silkexec
Not logged in

Changes to "Experiment: mmmv_silkexec" between 2017-01-07 17:17:20 and 2017-01-07 17:17:43

     1      1   <p>A mmmv_silkexec application is wrapper to other applications, including
     2      2   other mmmv_silkexec applications. The purpose of the wrapping is to use extra
     3      3   tags and user specific configuration parameters for using the wrappable
     4      4   application.</p>
     5      5   
     6      6   <p>The mmmv_silkexec consists of the following parts:</p>
     7      7   
     8         -<p>
            8  +<p></p>
     9      9   <ul>
    10     10   <li>An application for maintaining the tags, for example, tester specific test
    11     11   results.</li>
    12     12   <li>An operating system specific wrapper of a jail implementation for executing
    13     13   mmmv_silkexec applications.</li>
    14     14   <li>An application for maintaining mmmv_silkexec local installation specific
    15     15   configuration.<br>
    16     16   </li>
    17         -</ul></p>
           17  +</ul>
           18  +
           19  +<p></p>
    18     20   
    19     21   <p>No technical solution is going to compensate for crappy work, because
    20     22   technical tools can be switched off or the original authors of software may
    21     23   leave edge cases out of consideration, but the <b>main idea behind the
    22     24   mmmv_silkexec is to allow the execution of only those mmmv_silkexec
    23     25   applications that have been tested and/or verified by a trusted party.</b>&nbsp;The
    24     26   executable mmmv_silkexec application must have only dependencies that have also
    25         -been been verified and/or tested by trusted parties.&nbsp;</p>
           27  +been verified and/or tested by trusted parties.&nbsp;</p>
    26     28   
    27     29   <p>Different parties trust different other parties. Trust is a multidimensional
    28     30   value. A very kindhearted and not corrupt person can be totally untrustworthy
    29     31   from their capabilities point of view. On the other hand, sometimes, at some
    30     32   narrow contexts, enemies can be more trustworthy than friends. For example,
    31     33   enemies might have a good track record of fine skills and being rigorous and
    32     34   they might use some component, software package, at some security wise