Subject: Re: verified executable kernel modification committed
To: Dries Schellekens <>
From: Brett Lymn <>
List: tech-security
Date: 10/31/2002 23:31:06
On Wed, Oct 30, 2002 at 09:26:09PM +1030, Brett Lymn wrote:
> > Stephanie:
> > The Design of k5:
> > 
> Stephanie (iirc) made a trusted computing base by shifting all the
> critical binaries into a separate, locked down tree.

My apologies to Brian here - this is not correct.  Stephanie uses
Trusted Path Execution, it does not shift the binaries at all.  My
memory was faulty.  Note that Stephanie is not maintained anymore.

Brett Lymn