this post was submitted on 21 Feb 2026
107 points (95.7% liked)
Technology
81611 readers
4451 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Sorry but this whole thing is just snake-oil.
You can verify and sign your whole trust chain down to the last shared library and it doesn't matter when you don't know what the binary blobs on your TPM / CPU / BIOS / NIC are doing.
The only guarantee to a secure system is openness an all of that signing won't help you there.
Right, so because of your limited knowledge and understanding of what the actual needs of an entire industry are, it's all snake oil. Cool.
Meanwhile I'd just love a way to box up a custom machine, use something what he's building, ship it to site, and have it run without issue and have some piece of mind a competitor didn't try to gank the data over USB, or bypass the identity of the motherboard that SHOULD have boot blocks in place, or maybe someone just rips the SSD right out of it and tries to boot it elsewhere.
Fuck the rest of ALL that and the practical needs of security experts and system builders because YOU are worried that it somehow magically it's used for all kinds of other nefarious things.
Cool. Cool.