Looking through other users' (unprotected) files

Stuart D. Gathman stuart at BMS-AT.UUCP
Sat Oct 25 12:17:52 AEST 1986


In article <1501 at jade.BERKELEY.EDU>, mwm at eris.berkeley.edu (Mike (Don't have strength to leave) Meyer) writes:

> In article <2849 at rsch.WISC.EDU> mcvoy at rsch.WISC.EDU (Lawrence W. McVoy) writes:

> >	If you insist on a real world analogy, try this:  it's as if
> >someone said, "Here, use my house.  There are other people that I let
> >use my house, so here are some keys.  Use them to lock up your stuff.
> >If you don't, anyone else can play with your stuff, just as you may
> >play with anything you find."  See the difference?  It's not *your*
> >house, it's everyones' house.

> Would you rent an apartment under those conditions? I damned well
> wouldn't. Would you get upset if you left your door unlocked while you
> left for a short time, and came back and found your neighbors
> rummaging around in your apartment? How about your landlord?

The answer to the above questions depends on whether we are talking
about strangers or family.  In a family or community setting we have
the situation described by Mr McVoy as typical of a *nix environment.
The assumption is that all users are friendly (non-hostile).  This is
not a good assumption for a public time sharing service.  It is hopefully
a good assumption for a company computer. 

In a formal setting such as landlord and tenant, we are much more 
private and not so trusting.  This is the better approach for public systems.
-- 
Stuart D. Gathman	<..!seismo!{vrdxhq|dgis}!BMS-AT!stuart>



More information about the Comp.unix mailing list