I don’t think it’s true, that it’s generally considered not useful. One of MIRIs interviews was with one person engaged into provably-secure computing and I didn’t see any issues in that post. It’s just that provably-secure computing is not enough when you don’t have a good specification.
I don’t think it’s true, that it’s generally considered not useful. One of MIRIs interviews was with one person engaged into provably-secure computing and I didn’t see any issues in that post. It’s just that provably-secure computing is not enough when you don’t have a good specification.