a fun challenge: say that the legit firmware in the Ledger Nano has size N. create a malicious firmware of size N or smaller that responds with the legit firmware when the verifier asks the malicious firmware to prove that it’s legithttps://twitter.com/matthew_d_green/status/976074924266872832 …
-
-
I guess this would be something like a Pareto optimal compressed image?
-
Picks up chaitins book thats sit on my desk for a while and brain melts
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.