Changes To Experiment: mmmv_silkexec
Not logged in

Changes to "Experiment: mmmv_silkexec" between 2017-01-08 17:11:18 and 2017-01-08 17:26:08

    32     32   </li>
    33     33   </ul>
    34     34   
    35     35   <p></p>
    36     36   
    37     37   <p>No technical solution is going to compensate for crappy work, because
    38     38   technical tools can be switched off or the original authors of software may
    39         -leave edge cases out of consideration, but the <b>main idea behind the
    40         -mmmv_silkexec is to allow the execution of only those mmmv_silkexec
    41         -applications that have been tested and/or verified by a trusted party.</b>&nbsp;The
    42         -executable mmmv_silkexec application must have only dependencies that have also
    43         -been verified and/or tested by trusted parties.&nbsp;</p>
           39  +leave edge cases out of consideration, but the main ideas behind the
           40  +mmmv_silkexec are<b>&nbsp;</b>to <b>allow the execution of only those
           41  +mmmv_silkexec applications that have been tested and/or verified by trusted
           42  +parties</b>, the <a href="https://nixos.org/nix/">NixOS package manager</a>
           43  +idea that each application is executed in an environment, where <b>the
           44  +LD_LIBRARY_PATH and the PATH have mmmv_silkexec application specific prefixes</b>,
           45  +reliance on operating system services is&nbsp;<b>limited to the UNIX standard</b>
           46  +to give the mmmv_silkexec a chance to be ported to all operating systems that
           47  +have the UNIX layer <i>(Linux, BSD, GNU Hurd, Genode OS, Minix3)</i>.</p>
           48  +
           49  +<p>The executable mmmv_silkexec application must have only dependencies that
           50  +have also been verified and/or tested by trusted parties.&nbsp;</p>
    44     51   
    45     52   <p>Different parties trust different other parties. Trust is a multidimensional
    46     53   value. A very kindhearted and not corrupt person can be totally untrustworthy
    47     54   from their capabilities point of view. On the other hand, sometimes, at some
    48     55   narrow contexts, enemies can be more trustworthy than friends. For example,
    49     56   enemies might have a good track record of fine skills and being rigorous and
    50     57   they might use some component, software package, at some security wise