Re: Lost Trust
> First, prove that the blob is not the prefered form of modification.
If it is executable code and more than a few bytes long the probability
that it was written in hex is vanishingly small.
> Second, prove that the blob is executed on the host hardware plattform.
> If you don't, start removing most drivers around because they need "evil
> numbers" and "non-free strings to communicate with hardware"
Only software has source. Numbers and strings are not software.
email@example.com (John Hasler)
Dancing Horse Hill