• fruitycoder@sh.itjust.works
      link
      fedilink
      arrow-up
      5
      ·
      1 day ago

      Immutable, ephemerable, granularly permissioned, and encrypt EVERYTHING to enforce said permissions.

      1000x better than software signature hunting

      • rumba@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        23 hours ago

        It’s all fun and games until some asshole slips something into your trusted package manager.

        Exploits are the deal pain

        • fruitycoder@sh.itjust.works
          link
          fedilink
          arrow-up
          2
          ·
          24 hours ago

          Enforces confidentiality and integrity.

          Encryption on transports protects from man in the middle and sniffing. At rest protects evil maid exploits, which for these systems is more about preventing malicious software being swapped in place of trusted software.

          The same applies to encryption of links like pcie and memory with the time of transport and rest changing.