Summary: | SMEs need these Security Features in Mail and Web Clients | ||
---|---|---|---|
Product: | [Applications] kmail | Reporter: | Unknown <null> |
Component: | general | Assignee: | kdepim bugs <kdepim-bugs> |
Status: | RESOLVED WAITINGFORINFO | ||
Severity: | wishlist | CC: | luigi.toscano |
Priority: | NOR | ||
Version: | unspecified | ||
Target Milestone: | --- | ||
Platform: | unspecified | ||
OS: | Linux | ||
Latest Commit: | Version Fixed In: |
Description
Mike Hudson
2003-07-13 12:53:36 UTC
*** Bug 61191 has been marked as a duplicate of this bug. *** Replaced MikAHud@hotmail.com with null@kde.org due to bounces by reporter Even for a wishlist item this is very hand-wavy and non-specific. It also strikes me as somewhat misguided - it will not be possible to provide any sort of guarantee of data security with this plan as it is app-dependant and path dependant. You would need to apply these rules to everything from kmail to the cat and cp commands. This job belongs to perimeter security, not the applications. Suggest this be marked INVALID/WONTFIX. Thank you for your feature request. Kmail1 is currently unmaintained so we are closing all wishes. Please feel free to reopen a feature request for Kmail2 if it has not already been implemented. Thank you for your understanding. Instead of creating a new feature request, please confirm here if the wishlist is still valid for kmail2. |