Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Then don't run code from untrusted sources.

This also has major implications for cloud compute.



That's not a realistic answer.

Do you have any idea how much software is on the average consumer device, and how poorly equipped the average consumer is to determine its provenance let alone decide what is trustworthy?

Not to mention that there are economic reasons to run untrusted software. For example no matter how little I trust Zoom and Slack, I don't have a job if I am not willing to run them.


Sure, but homomorphic encryption doesn't really change anything on that front.

Maybe it might in theory make it much harder to audit, but its not like you are auditing all that code right now.


I like the approach of having a dedicated PC and phone that is permitted to be riddled with remote-management and malware and used only for those purposes, and my own devices completely separate.


I liked that approach until I realized that devices are replaceable, people aren't.

If my kids want to play a game wirh me, I'll install the game. A pristine device that I can't use to further my values is worthless to me.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: