Conversation

Don't hand over your email. Don't hand over your name. Don't hand over your social media. Don't hand over any personally identifiable information to use Bitcoin, no matter how new and shiny the latest toy is. The biggest gaping security hole is the one you dig yourself.
10
461
> Gsm chip for example is connected to memory bus and can read any memory location Whether or not a component is part of the SoC isn't directly connected to whether or not it's isolated. Separate chips often have DMA, and SoC components usually have better IOMMU configuration.
2
I don't think it's okay to propagate falsehoods for self-promotion, even if they think the ends justify the means. They are offering a nice feature (kill switch for microphone) while losing dozens of standard hardware security features and moving to a far inferior software stack.
1
Show replies