-----BEGIN PGP SIGNED MESSAGE-----
I am being forced to run software on my computer that I do not
inherently trust. It is supposed to collect a few pieces of information,
mainly my mac addresses and use the network. It is a one-time use CSA
(client security agent). It uses a csh script to unpack a "proprietary
binary" that we cannot see the source. There is no assurance it doesn't
collect other information or change anything on my computer.
I was curious as to what is the best way to handle this and situations
like these. In this instance, I was assuming downloading, and running on
a LiveCD would seem like the best policy. What if it uses methods to
discover that and I need to run it on my real installation? Is a chroot
jail the next best thing? As far as I know, to make a chroot jail I
merely copy programs and libraries inside a folder with the proper /
hierarchy and chroot into it. Is it more complex than this and are there
Any and all suggestions are welcome.
Douglas Breault Jr.
How do I know the past isn't fiction designed to account for the discrepancy
between my immediate physical sensations and my state of mind?
/~\ The ASCII Douglas Breault Jr. <GenKreton at comcast dot net>
\ / Ribbon Campaign GnuPG public key ID: C4E44A19 (pgp.mit.edu)
X Against HTML Key fingerprint:
/ \ Email! 21C3 F37D A8F5 1955 05F2 9A69 92A0 C177 C4E4 4A19
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
-----END PGP SIGNATURE-----
email@example.com mailing list