A very interesting thought experiment for transparent exceptional access that doesn't directly sabotage the ciphers and delegates access to diverse institutions, but the assumptions are greatly flawed https://arxiv.org/abs/1912.05620 ^HU 1/4
-
-
"Assumption 2.We assume that the only two ways to unlock a device is through the intended mechanism (i.e., by providing a password) and the JJE exceptional access protocol." OK a perfect hardware and software stack... I'll bite ^HU 3/4
Prikaži ovu nit -
"Assumption 3.We assume that only devices honestly following the protocol can be unlocked using the JJE exceptional access protocol" If people can freely chose what code to run, they can go for designs without this access mechanism leaving you with your dick in your hand. ^HU 4/4
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.