Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Turns out that even compiled software can be modified to suit the user’s intent, thankfully.


(Note: Not talking about Apple now, hypothetically...) How would one do this on a fully trust-chained system with processor support?

Barring software bugs that allow for arbitrary code exec as the binary?

Signed package + necessary keys embedded in silicon -> processor verfies signature at memory load -> processor disallows user privilege escalation to write to arbitrary memory




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: