schizoidman@lemmy.zip to Technology@lemmy.worldEnglish · 3 days agoChina releases 'UBIOS' standard to replace UEFI — Huawei-backed BIOS firmware replacement charges China's domestic computing goalswww.tomshardware.comexternal-linkmessage-square50fedilinkarrow-up1238arrow-down13 cross-posted to: [email protected]
arrow-up1235arrow-down1external-linkChina releases 'UBIOS' standard to replace UEFI — Huawei-backed BIOS firmware replacement charges China's domestic computing goalswww.tomshardware.comschizoidman@lemmy.zip to Technology@lemmy.worldEnglish · 3 days agomessage-square50fedilink cross-posted to: [email protected]
minus-squaregandalf_der_12te@discuss.tchncs.delinkfedilinkEnglisharrow-up7arrow-down2·3 days ago could could in the same sense that i could check all software i use for bugs and malicious code. realistically, i can’t, because it’s way too much work.
minus-squareBuffalox@lemmy.worldlinkfedilinkEnglisharrow-up11·3 days agoBut you could work together with other people, and you could be many people that each checked his/her part for malicious code.
minus-squareHule@lemmy.worldlinkfedilinkEnglisharrow-up1arrow-down1·1 day agoAnd you could trust them all!
minus-squareTangent5280@lemmy.worldlinkfedilinkEnglisharrow-up2·1 day agoYou could do it with enough people that there is several sections overlapping between unrelated people that it becomes infeasible even for state actors to compromise EVERY person attesting any one piece of software
minus-squareBuffalox@lemmy.worldlinkfedilinkEnglisharrow-up1·1 day agoWhy would you do it with people you don’t trust?
could in the same sense that i could check all software i use for bugs and malicious code. realistically, i can’t, because it’s way too much work.
But you could work together with other people, and you could be many people that each checked his/her part for malicious code.
And you could trust them all!
You could do it with enough people that there is several sections overlapping between unrelated people that it becomes infeasible even for state actors to compromise EVERY person attesting any one piece of software
Why would you do it with people you don’t trust?