Re: Lost Trust
Eduard writes:
> First, prove that the blob is not the prefered form of modification.
If it is executable code and more than a few bytes long the probability
that it was written in hex is vanishingly small.
> Second, prove that the blob is executed on the host hardware plattform.
That's irrelevant.
> If you don't, start removing most drivers around because they need "evil
> numbers" and "non-free strings to communicate with hardware"
Only software has source. Numbers and strings are not software.
--
John Hasler
john@dhh.gt.org (John Hasler)
Dancing Horse Hill
Elmwood, WI
Reply to: