PhilGoetz comments on How to escape from your sandbox and from your hardware host - Less Wrong

28 Post author: PhilGoetz 31 July 2015 05:26PM

You are viewing a comment permalink. View the original post to see all comments and the full post content.

Comments (28)

You are viewing a single comment's thread. Show more comments above.

Comment author: Dagon 01 August 2015 06:23:25PM 1 point [-]

I have yet to see any claims of a "secure" system that doesn't state the assumptions and validations of the hardware involved. It may be only my world, but a whole lot of attention is paid to the various boundaries between containers (sandbox, VM, virtualized host, physical host, cluster, airgap), not just to the inner level.

Mostly, "provably secure" means all layers, unless there's a fair bit of fine print with it.

Comment author: PhilGoetz 01 August 2015 07:46:21PM *  11 points [-]

Mostly, "provably secure" means all layers, unless there's a fair bit of fine print with it.

I don't think that's possible. Then "provably secure" would have to include a proof that our model of physics is correct and complete.

More generally, a "proof" is something done within a strictly-defined logic system. By definition it makes assumptions, and proves something given those assumptions.

Comment author: cousin_it 03 August 2015 07:43:59AM *  9 points [-]

Then "provably secure" would have to include a proof that our model of physics is correct and complete.

And also a proof that Bob from accounting can't be convinced to let the AI use his phone for a minute. That's a very tall order.

Comment author: Autolykos 05 August 2015 09:36:05AM 1 point [-]

Yup. Layer 8 issues are a lot harder to prevent than even Layer 1 issues :)