Verified safe software means the battle shifts to vulnerabilities in any human who has authority over the system.
This seems tougher for attackers because experimentation with specific humans is much costlier than experimentation with automated systems.
(But I’m unsure of the overall dynamics in this world!)
Verified safe software means the battle shifts to vulnerabilities in any human who has authority over the system.
This seems tougher for attackers because experimentation with specific humans is much costlier than experimentation with automated systems.
(But I’m unsure of the overall dynamics in this world!)