Toggle light / dark theme

1 Comment so far

  1. “Gaming, VR, Pr0n, more Bitcoin hashing power.” Flawed architectures of yore, leading to the perpetual cat & mouse game of infosec. Information Security reaches an endgame with “Trustworthy” computing architectures. 0-days are rarely found, if ever. New hardware, new OS. The last time was, last decade, or something. “SETI? Have we seen the Yeti?” What are things we will most often throw computing power at, when it overflows with abundance?

Comments are closed.