News Focus
News Focus
icon url

TonyMcFadden

08/10/03 11:38 AM

#5307 RE: Zeev Hed #5306

Zeev, it's good to look for weaknesses in the concept. I'd hazard a guess that these weaknesses have already been addressed, but I'd suggest you address your concerns to Wave also (I'm not suggesting that you don't post here. By all means. Address these issues -- they are important).

Len Veil is the CTO. (lveil@wavesys.com ). I'm sure he can provide intelligent answers to any questions the board can't answer.

(Off hand, though, I would suggest that wi-fi within a TAN infrastructure would be verboten...)
icon url

onesevenus

08/10/03 11:43 AM

#5308 RE: Zeev Hed #5306

Yes, Backhole entry into a secure network, But

TC is about protected participants, not related to a network security, at least not yet. In other words, Trusted Components (PCs, Servers etc..) should theoretically operate without security threat over a totally unsecure network.

Well, it is true, that one can implement TC in network components, creating a Trusted Network environment, but that is a possible future, and not a requirement for TC to take place in a totally, I mean totally unsecure network.

That is where I think the strength is, and that is why I believe that the abbandoned concept, is becoming the industry focus now. Will it prevail, we shal see.

My bet is that it will.

icon url

scorpio_esq

08/11/03 8:06 AM

#5400 RE: Zeev Hed #5306

What an uninformed statement. The internet is an open network (an unsecure 'mesh') and the WiFi environment is basically a a similar construct, using RF links between the nodes. Think about it.
icon url

Packstater

08/11/03 8:11 AM

#5401 RE: Zeev Hed #5306

Zeev,

You really need to take some time and learn about Embassy and the Wave solution. Unprotected / insecure networks are the reason FOR Wave's technology. I TRUST you are interested enough to do the DD....

-P