User: Password:
|
|
Subscribe / Log in / New account

Bitfrost: the OLPC security model

Bitfrost: the OLPC security model

Posted Feb 8, 2007 16:07 UTC (Thu) by nix (subscriber, #2304)
In reply to: Bitfrost: the OLPC security model by NAR
Parent article: Bitfrost: the OLPC security model

I see what you mean: what stops thieves contacting the developers and asking for a developer's key? (Equally, what stops crooked bureaucrats diverting the identity USB keys at the same time as they divert a bunch of laptops?)


(Log in to post comments)

Bitfrost: the OLPC security model

Posted Feb 8, 2007 16:11 UTC (Thu) by corbet (editor, #1) [Link]

There is a delay built into the developer key mechanism; if the laptop is reported stolen during the wait, no key is issued.

Bitfrost: the OLPC security model

Posted Feb 8, 2007 23:03 UTC (Thu) by drag (subscriber, #31333) [Link]

Also I presume that they would take steps to confirm your identity so that they are issuing a key to a laptop to the person that is actually suppose to have the laptop. (I don't think 'theft' would constitute 'distribution' under the GPL)

Sort of like how if you work in a corporate setting and somebody calls you up asking for (or to reset and replace) a password they 'forgot' you would want to take a bit of time to try to confirm the identity of the person on the other side of the phone before issuing the password.


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds