Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The telco trusts its own network. Telcos doesn't trust users, so users need to authenticate themselves, and devices need to be regulated. But under the traditional telco security model, the network doesn't need to authenticate itself to the devices.

Even today, building the necessary infrastructure for network trust management is also really, really hard across the many jurisdictions involved.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: