Re: The hardware underneath
The roll-your-own movement is still alive and kicking as a direct result of governmental overreach. They are a solid part of the people I hang out with on the weekends. There already exist CPU's which have been verified as being per specifications, without additions. Operating system kernels formally verified. Each program as well. And so forth as we work up the stack. Note: Everything outside the device is considered insecure. There's some special theories about securing communications beyond the end point, considered an essential feature in the face of a determined attacker.
There's also a solid group trying to figure out ways to operate in an environment where you can't trust any device or its components. That group is operating at a level that loses me. I really need to upgrade my maths to correspond to what they are practicing.
Interesting problems and it's not like I have much else to do these days.