Apple's system goes further by having incoming requests choose and verify a server and then encrypt itself using the public key of the node to prevent MITM attacks.
And a one-time credential to prevent replay attacks.
As well as minor things like obfuscating IP addresses, metadata etc.
Apples system is also the entire pipeline. Borg SREs can still change behavior here. It’s a lot better than what most places have but does not go far enough.
And a one-time credential to prevent replay attacks.
As well as minor things like obfuscating IP addresses, metadata etc.