khafra comments on How to escape from your sandbox and from your hardware host - Less Wrong
You are viewing a comment permalink. View the original post to see all comments and the full post content.
You are viewing a comment permalink. View the original post to see all comments and the full post content.
Comments (28)
I'm not sure what you think it means. Care to elaborate?
In computer science, provably secure software mechanisms rely on an idealized model of hardware; they aren't and can't be secure against hardware failures.
In my experience, they also define an attacker model against which to secure. There are no guarantees against attackers with greater access, or abilities, than specified in the model.