Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Perhaps this will bring further mindshare to the RISC-V approach in the future?

Security people will just move the goalposts to "we assume the actual chip has backdoors that aren't present in public source code".



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: