Please Delete
Posted: Sat Apr 22, 2017 2:07 pm
-Snip-
Both of these models have been tried numerous times before, most recently with things like the Chromebook, with what could be politely described as mixed results.aliceinchainz wrote:A) Devices are just slaves that stream content from a cloud server and only know how to operate on basic input hardware but do no "thinking". OR
B) Subscribers are forced to net boot into a login screen that once credentials are supplied are given an obfuscated(headers, standards), randomized(load order), and even encrypted. Then the OS loads your saved content being either encrypted from the last session or decrypted being some sort of IoT standard. Now only the system understands how to communicate with itself which is where some sort of internet cloud based application layer downloads the code*not to be confused with the content* of the applications you are subscribed too that are custom to your OS. Even programmers can write non specific code and submit it to said company too in theory run on any completely "random" system.
That answer is C, we have to constantly patch security holes and this also applies if the A or B path is taken.aliceinchainz wrote:I think this is what the future holds in some form or another. Either...
A) Devices are just slaves that stream content from a cloud server and only know how to operate on basic input hardware but do no "thinking". OR
B) Subscribers are forced to net boot into a login screen that once credentials are supplied are given an obfuscated(headers, standards), randomized(load order), and even encrypted. Then the OS loads your saved content being either encrypted from the last session or decrypted being some sort of IoT standard. Now only the system understands how to communicate with itself which is where some sort of internet cloud based application layer downloads the code*not to be confused with the content* of the applications you are subscribed too that are custom to your OS. Even programmers can write non specific code and submit it to said company too in theory run on any completely "random" system.
C) We continue to make fixed systems and constantly patch security holes in a snake eating itself scenario. Leaving only non public OS software mostly unaffected.