On Wed, Nov 16, 2016 at 2:43 PM, '81029438'1094328'0194328'0914328 <kersten.vo...@gmail.com> wrote: > ... idealistic description of heterogeneous computations and validating i/o > proxy ...
This method of verification is not the panacea it may appear to be. If an attacker can find vulnerabilities (potentially for different inputs at different times) in each respective system (which may or may not be that difficult in practice), then their exploit payload could simply produce identically-incorrect results for an agreed upon different operation at a later time, and your validating proxy would not catch it because all outputs are identical. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABQWM_BLkzMA_F33252eifcVUGO8-h5W8ThqSHBY4zPX5xeXvA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.