Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I agree totally.

But we haven't come up with any better methods of doing this. Some tasks require making changes to the machine that could be evil, so we have to ask the user for permission to make those changes (to stop evil people making those changes with no permission). The more parts of the device we protect, the more we have to ask for permission, and the more routine the granting of that permission is and the less effective the whole permission-granting mechanism is.

Coming up with a decent, workable, solution to this would be great. As you say, in an ideal world the onus would not be on the user to verify that the software they're installing is not malicious (with no way of effectively doing that).

hmm, sounds like a problem that could be lucrative to solve...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: