On Wed, Nov 16, 2016 at 2:43 PM, '81029438'1094328'0194328'0914328
<kersten.vo...@gmail.com> wrote:
> ... idealistic description of heterogeneous computations and validating i/o 
> proxy ...

This method of verification is not the panacea it may appear to be.

If an attacker can find vulnerabilities (potentially for different
inputs at different times) in each respective system (which may or may
not be that difficult in practice), then their exploit payload could
simply produce identically-incorrect results for an agreed upon
different operation at a later time, and your validating proxy would
not catch it because all outputs are identical.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_BLkzMA_F33252eifcVUGO8-h5W8ThqSHBY4zPX5xeXvA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to