logoalt Hacker News

goodpointyesterday at 1:36 PM1 replyview on HN

This is 100% false.


Replies

lrvicktoday at 12:31 AM

Once supply chain attacks enter your threat model, you suddenly realize that the entire internet breaks if any one of a few hundred volunteer owned home computers are compromised.

Fixing this requires universal reproducible builds redundantly built and signed by independently controlled hardware. Once you have that then you no longer have single points of failure so centralized high security colo cost becomes a moot issue.