No link, we didn’t publish the work.
@nobleshift@mastodon.social
No link, we didn’t publish the work.
A hacker group in Seattle (GHI) years ago attempted to build secure systems on top of compromised hardware. Although different levels of security could be achieved, the overall outcome was No. You cannot build a fully secured system on top of compromised hardware.
A VPS for this exercise counts as ‘compromised’ hardware.
Purchase a used laptop for $300. Install Lini (Linuxes, Linuxis?), learn.