Deutsch English Français Italiano |
<v3q310$11ij4$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Stephen Fuld" <SFuld@alumni.cmu.edu.invalid> Newsgroups: comp.arch Subject: Re: Byte Addressability And Beyond Date: Wed, 5 Jun 2024 16:16:32 -0000 (UTC) Organization: A noiseless patient Spider Lines: 23 Message-ID: <v3q310$11ij4$1@dont-email.me> References: <v0s17o$2okf4$2@dont-email.me> <v327n3$1use$1@gal.iecc.com> <BM25O.40665$HBac.4762@fx15.iad> <v32lpv$1u25$1@gal.iecc.com> <v33bqg$9cst$11@dont-email.me> <v34v62$ln01$1@dont-email.me> <v36bva$10k3v$2@dont-email.me> <2024May29.090435@mips.complang.tuwien.ac.at> <v38opv$1gsj2$3@dont-email.me> <v38rkd$1ha8a$1@dont-email.me> <jwvttifrysb.fsf-monnier+comp.arch@gnu.org> <f90b6e03c727b0f209d64484ec097298@www.novabbs.org> <v3jtd8$3qduu$2@dont-email.me> <20240603132227.00004e0f@yahoo.com> <k6k7O.8602$7jpd.5620@fx47.iad> <v3klhp$3ugeh$1@dont-email.me> <v3mljt$c63k$1@dont-email.me> <v3nf7j$gesm$1@dont-email.me> <v3padn$the9$1@dont-email.me> <v3pph1$1010d$1@dont-email.me> <20240605164905.000054da@yahoo.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 7bit Injection-Date: Wed, 05 Jun 2024 18:16:33 +0200 (CEST) Injection-Info: dont-email.me; posting-host="61d35cd0bc070ff15be1578b8eb57b77"; logging-data="1100388"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+loOPYalpy3xLCITSIsU3g5O630IQcwRQ=" User-Agent: XanaNews/1.21-f3fb89f (x86; Portable ISpell) Cancel-Lock: sha1:fLICTUxxqaaGzYzBzM4OpiYM/Ok= Bytes: 2212 Michael S wrote: snip lots of stuff about encryption alternatives > The best, the most secure encryption is an end-to-end encryption. > Which means application-to-application. > It's not that other, "piece-wise" encryption types can't be used, but > if you are serious about privacy you should consider them > insufficient. That's fair. But there are counter arguments like not doing the encryption on a processor that is also executing arbitrary user code makes it more immune from side attacks. -- - Stephen Fuld (e-mail address disguised to prevent spam)