so, hmm, we rely on firmware we can't inspect, compilers we don't build, closed-source LLMs, proprietary enclaves, remote updates etc. Each of these layers is a target and more will join in the coming years/decades. In a world this complex (and guys this complexity is our own making!), how do we even verify that we're safe? If you ask me, verification has never been more critical or more impossible.
- 3 replies
- 2 recasts
- 28 reactions
Had a fun convo recently where some dude was talking about Uber and ride-sharing. I told him I've never used any of those services in my life (I'm being serious here). He looked confused and asked how I get around usually. Well it's pretty simple: I always take a taxi & pay in local cash. I don't like being tracked. Look people forget that physical cash is one of the last forms of everyday privacy we still have. Cash is cypherpunk. Cash is freedom.
- 2 replies
- 2 recasts
- 38 reactions
if someone ever managed to breach all _private_ GitHub repos (I mean it's insanely difficult but not impossible) it would be one of the most catastrophic events in the security history, and if I were a state-level actor that's exactly the kind of target I'd prioritise rn. I was thinking about this scenario since this morning I wanted to push something (more or less sensitive) to a private repo but ended up rolling it back purely out of paranoia. I guess the right threat model for private repos is that it can be assumed to be leaked one day.
- 10 replies
- 7 recasts
- 64 reactions
