- Дата: 1-04-2023, 21:02
2. It's not require a lot technical know how (not reverse engineering your BIOS to verify its integrity or making an attempt to debug rootkits). 3. The overhead involved is scalable to the quantity of safety required. That is, many shortcuts can be taken with out weakening the overall system. 4. It is an unambiguous set of steps that don’t require judgment to be carried out. 5. It's fault tolerant (many parts can get pwned, and it nonetheless is very secure). 6. It is efficient against quite a lot of menace models, as much as and together with a nation-state which has full knowledge of your setup, a staff of hackers working to pwn you individually, and a black bag crew that can enter your house with out your data. Let’s name our adversary Eve. I believe unless Eve can bring to bear the resources described in merchandise 6, your setup is perfectly secure. Any feedback on the protocol I describe can be appreciated.