khafra comments on How to escape from your sandbox and from your hardware host - Less Wrong

28 Post author: PhilGoetz 31 July 2015 05:26PM

You are viewing a comment permalink. View the original post to see all comments and the full post content.

Comments (28)

You are viewing a single comment's thread. Show more comments above.

Comment author: khafra 31 August 2015 02:29:40PM *  3 points [-]

provably secure software mechanisms rely on an idealized model of hardware

In my experience, they also define an attacker model against which to secure. There are no guarantees against attackers with greater access, or abilities, than specified in the model.