Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> If one controls/monitors for every app in system

Quis custodiet ipsos custodes? Who monitors the monitor?

What happens when it is compromised, loopholed through, gets its inputs tampered with, etc.? For a home setup and its threat model, this sounds a simple, workable plan. When you're dealing with attacks of the level of sophistication described in the OP, trusting trust [1] becomes complicated and difficult.

[1] http://users.ece.cmu.edu/~ganger/712.fall02/papers/p761-thom...



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: