Your posts just reminded me of it, so maybe it'll provide some new viewpoints for you? 
I think you're mixing together redundant voting systems and security. Having things like 3 identical systems doing the same thing and cross checking each other is common in avionics, but that's for reliability. If you're an attacker you just compromise all 3 at once.
-
-
Ultimately you could try to have something like multiple independent implementations of the same process to safeguard against individual bugs, but that kind of approach isn't really going to fly (no pun intended) for general-purpose software.
-
I completely agree. I suspect that limited introspection can identify a reasonable number of attacks in progress though.
- Show replies
New conversation -
-
-
The context as it presented to me at the time was that the systems were not redundant, they just didn’t trust the other computing subsystems sitting on a common platform. I don’t know the how unfortunately.
-
That's just general security hygiene then, no? You want to prevent lateral movement, so you don't trust any external system to give you valid data.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.