I know people have mixed opinions on Braxman but I don’t see any huge leaps in logic here tbh… Thoughts?

  • GolfNovemberUniform@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    3 letter agencies, governments in general and data hungry companies will continue searching for a way to bypass encryption. And just a reminder: direct access to the system (remote or physical) bypasses all kinds of encryption unless it’s protected separately. Backdoors and kernel level anti-cheats ftw

          • GolfNovemberUniform@lemmy.ml
            link
            fedilink
            arrow-up
            0
            ·
            5 months ago

            I didn’t mean that. I meant if the hacker has access to the administrator (or just user in case with E2EE messengers) account, they can see and download anything, no matter how encrypted it is. The chips can do stuff as well but idk any proof of that tbh

            • jet@hackertalks.com
              link
              fedilink
              English
              arrow-up
              0
              ·
              edit-2
              5 months ago

              Sure, side channel leakage if you can run locally.

              Honestly, most machines have enough cores, that you could pin a process to a specific core giving it independent cache, and work around a lot of these side channel attacks. So you’re encrypted end to end messenger would get an exclusive core. Kind of like how we do VM pinning nowadays