Matthew Green on Nostr: A second protection is that the operating system can “attest” to the software ...
A second protection is that the operating system can “attest” to the software image it’s running. Specifically, it signs a hash of the software and shares this with every phone/client. If you trust this infrastructure, you’ll know it’s running a specific piece of software. 10/
Published at
2024-06-11 12:04:10Event JSON
{
"id": "5254e754236cc42c7c5cc033ccb652f4b2771d18cc13e47b8edb7ed98811064a",
"pubkey": "5c06f588380197da5dfbe2e32928b9b6d82c62dac0c602535a09ee1cad5a8221",
"created_at": 1718107450,
"kind": 1,
"tags": [
[
"e",
"2077c4d6f1838fbcab3836893a39c613818b9b78aca51cbb6005e317191ff283",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://ioc.exchange/users/matthew_d_green/statuses/112597889847192816",
"activitypub"
]
],
"content": "A second protection is that the operating system can “attest” to the software image it’s running. Specifically, it signs a hash of the software and shares this with every phone/client. If you trust this infrastructure, you’ll know it’s running a specific piece of software. 10/",
"sig": "3dc55188eff2cf6e13c76c115d4dd3e362f17ae2b2f3ef0a5358e6a6d21065402497e595479fef850038543b1cffc54832419423db8174a9877a0c5f0608f859"
}