*countable infinities only

Peter Jones pjones at redhat.com
Thu May 31 18:21:46 UTC 2012

On 05/31/2012 02:08 PM, Gerry Reno wrote:

> The hardware is under control of the user.
> At some point the user has to know what they consider trusted.

I totally agree. This is why I've been writing tools to do your own signing
and key management. It's totally okay to do your own thing, I expect some
people will, and I'll do what I can to promote that.


More information about the devel mailing list