tech-security archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Security properties of domain socket communication buffers
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Giles Lean <giles.lean%pobox.com@localhost> writes:
> My first response ignored virtualisation -- if your software will run
> within virtualised operating system instances, then you have to worry
> about whether the virtual machine manager will page guest OS memory to
> disk. Unless that's too paranoid for your taste? :-)
That amount of paranoia is inadequate to stimulate even a single one of
my taste buds :-). But yeah, obviously all bets are off on this sort of
thing when virtualization is in play and you don't control the host.
Thanks for your help.
- --
Daniel Franke df%dfranke.us@localhost http://www.dfranke.us
|----| =|\ \\\\
|| * | -|-\--------- Man is free at the instant he wants to be.
-----| =| \ /// --Voltaire
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iF4EAREKAAYFAkoZ+kAACgkQ8tqcOcPA7qO1lQD9EtN0b3tIiI8wPTPv09tVYSjd
AEHEubLFlSl29DzUse8A/2eGSWP+4OdzcovY+Xp0frys+hNoXAU2xUOBl81sV+pV
=+ON6
-----END PGP SIGNATURE-----
Home |
Main Index |
Thread Index |
Old Index