this post was submitted on 14 Apr 2024
34 points (100.0% liked)
Technology
37727 readers
469 users here now
A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.
Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.
Subcommunities on Beehaw:
This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
It's still not your hardware, so you can't rely on the data being private to you even if the connection is secure.
Then there's going to be all the politics present with the location of whatever endpoint you connect to, issues of uptime and availability, etc.
It's a matter of the threat model you're concerned about, but this does not fill me with confidence if this is considered a "breakthrough solution". There's nothing quite like a half assed solution to kneecap work on a "proper" one.
From the article:
This is a breakthrough because this level of security is impossible currently (as you allude to in your comment).
Availability will still be an issue, of course.