glyph, If you have not read this paper, you probably should. I don’t have a particular comment but the parallels are obvious and you are probably going to be seeing a lot of experienced security people referencing it in discussions in the coming days
https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
Add comment