Comment by gomijacogeo
1 day ago
Over time, require trusted boot and a TPM. Require a signed age-verification cert to get tokens to access io devices and net. It feels like part of a long play to claw unregulated general purpose computing out of the hands of the masses. Or, at least, get as much as can be moved into the cloud which can be easily surveilled and shut down.
No comments yet
Contribute on Hacker News ↗