schizoidman@lemmy.zip to Technology@lemmy.worldEnglish · 2 months agoChina releases 'UBIOS' standard to replace UEFI — Huawei-backed BIOS firmware replacement charges China's domestic computing goalswww.tomshardware.comexternal-linkmessage-square52linkfedilinkarrow-up1252arrow-down14
arrow-up1248arrow-down1external-linkChina releases 'UBIOS' standard to replace UEFI — Huawei-backed BIOS firmware replacement charges China's domestic computing goalswww.tomshardware.comschizoidman@lemmy.zip to Technology@lemmy.worldEnglish · 2 months agomessage-square52linkfedilink
minus-squaregandalf_der_12te@discuss.tchncs.delinkfedilinkEnglisharrow-up7arrow-down2·2 months ago could could in the same sense that i could check all software i use for bugs and malicious code. realistically, i can’t, because it’s way too much work.
minus-squareBuffalox@lemmy.worldlinkfedilinkEnglisharrow-up11·2 months agoBut you could work together with other people, and you could be many people that each checked his/her part for malicious code.
minus-squareHule@lemmy.worldlinkfedilinkEnglisharrow-up2arrow-down1·2 months agoAnd you could trust them all!
minus-squareBuffalox@lemmy.worldlinkfedilinkEnglisharrow-up1·2 months agoWhy would you do it with people you don’t trust?
minus-squareTangent5280@lemmy.worldlinkfedilinkEnglisharrow-up1·2 months agoYou could do it with enough people that there is several sections overlapping between unrelated people that it becomes infeasible even for state actors to compromise EVERY person attesting any one piece of software
could in the same sense that i could check all software i use for bugs and malicious code. realistically, i can’t, because it’s way too much work.
But you could work together with other people, and you could be many people that each checked his/her part for malicious code.
And you could trust them all!
Why would you do it with people you don’t trust?
You could do it with enough people that there is several sections overlapping between unrelated people that it becomes infeasible even for state actors to compromise EVERY person attesting any one piece of software