A very interesting thought experiment for transparent exceptional access that doesn't directly sabotage the ciphers and delegates access to diverse institutions, but the assumptions are greatly flawed https://arxiv.org/abs/1912.05620 ^HU 1/4
-
-
"Assumption 3.We assume that only devices honestly following the protocol can be unlocked using the JJE exceptional access protocol" If people can freely chose what code to run, they can go for designs without this access mechanism leaving you with your dick in your hand. ^HU 4/4
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.