(apparent deadlink BTW). In answer to the question: slow and steady Hawking radiation from all the black holes, perhaps?
(apparent deadlink BTW). In answer to the question: slow and steady Hawking radiation from all the black holes, perhaps?
Not all made up though. I’ve been following this one’s mailing list for a while https://en.wikipedia.org/wiki/Zephyr_(operating_system)
I was around long before TiVo and I’m not sure what it says about me that the only thing of substance I know about it is that the GPL3 (GNU Public License v3) was largely referred to as the “anti-tivoization” license because it addressed loopholes being exploited in GPL2 by TiVo hardware manufacturers to use copy left software opaquely.
printf ‘GET / HTTP/1.0\r\n’ | openssl s_client -connect example.com:443 -ign_eof | html2text
If you’re only talking about Storage (data at rest) or Network (data in transit) then encrypt/decrypt offsite and never let symmetric keys (or asymmetric private keys) near the VPS, or for in-transit you could similarly setup encrypted tunnels (symmetric/private keys offsite only) where neither end of the tunnel terminates at the VPS. If you’re talking about Compute then whatever does the processing inherently needs access to decrypted data (in RAM, cache, etc) to do anything meaningful. Although there are lots of methods for delegating, compartmentalising, obfuscating, etc (like enclaves, TPM/vTPM…) the unavoidable truth is that you must trust whomever owns the base-infra ultimately processing your data. The one vaguely useful way to use “other people’s computers” trustlessly is with SMPC (secure multi-party computation) spread sufficiently widely across multiple independent (preferably competing - or even adversarial!) virtual-computation providers, with an “N-of-M keys” policy that avoids any single provider being able to attain a meaningful level of access to your data independently, or being able to view tangible portions of your data while providing functionality during SMPC. That stuff gets super-niche though.