Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But, isn’t the argument that access this way is cumbersome and only available economically to priority targets?

Also, if you need you can run Linux as end points.



Run Linux ... on a device whose CPU has an unauditable security coprocessor? A CPU whose microcode is implemented in encrypted firmware? A device whose physical hardware can't be meaningfully audited without state actor level resources?

I don't really think such approaches are used or even viable currently. But if it ever were a concern, "run Linux" doesn't even begin to address it. (Anyway you can't run Linux if your endpoint is a phone with a locked bootloader.)


The only way that I can see this being actually safe is if you make the hardware to encrypt and decrypt the data yourself.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: