We need sovereign hardware. Every piece of hardware is spyware
Discussion
Strongly agree. This is the most challenging part of the problem.
However, this can be somewhat mitigated by writing code that doesn't trust the hardware.
We need sovereign hardware. Every piece of hardware is spyware
Strongly agree. This is the most challenging part of the problem.
However, this can be somewhat mitigated by writing code that doesn't trust the hardware.