"Assumption 1.We assume that tamper-reistant, secure en-claves exists and are free of vulnerabilities." Impossible without vetted open hw designs and personal chip fabs to ensure against hardware backdoors. Every similar tech in the space was broken SGX, TPM, TrustZone ^HU 2/4
-
-
Prikaži ovu nit
-
"Assumption 2.We assume that the only two ways to unlock a device is through the intended mechanism (i.e., by providing a password) and the JJE exceptional access protocol." OK a perfect hardware and software stack... I'll bite ^HU 3/4
Prikaži ovu nit -
"Assumption 3.We assume that only devices honestly following the protocol can be unlocked using the JJE exceptional access protocol" If people can freely chose what code to run, they can go for designs without this access mechanism leaving you with your dick in your hand. ^HU 4/4
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.