Hacker News new | past | comments | ask | show | jobs | submit login

> ...am i correct to assume it's not the same threat model as encrypted/signed backups pushed to some friends lending storage space for you (who could corrupt your backup but can't corrupt your working data)?

Threat model? At a large enough scale, even CPUs can be bad actors: https://muratbuffalo.blogspot.com/2021/06/silent-data-corrup...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: