Vulnerability Development mailing list archives

Re: Rumor


From: Aj Effin ReznoR <aj () REZNOR COM>
Date: Thu, 26 Oct 2000 12:23:08 -0700

"Brvenik, Jason" wrote:

Has anyone looked at the stuff mentioned in this article.

It says "token-based authentication" is used to ensure the validity of the files and will be used to distribute virus 
updates, firewall updates...

www.zdnet.com/zdnn/stories/news/0,4586,2643266,00.html

Not bad, but interesting for more "secure" (still awaiting peer review) file
sharing for personal and biz usage, Groove Networks, http://www.groove.net

Of course, it lacks the toke-based blah blah blah, but a simple infrastructure
can be implemented regardless.

-aj.


Current thread: