Hacker News new | past | comments | ask | show | jobs | submit login

To be fair, it's much easier than one can imagine (try ollama on macOS for example). In the end, Apple wrote a lot of longwinded text, but the summary is "you have to trust us."

I don't trust Apple - in fact, even the people we trust the most have told us soft lies here and there. Trust is a concept like an integral - you can only get to "almost" and almost is 0.

So you can only trust yourself. Period.






There are multiple threat models where you can't trust yourself.

Your future self definitely can't trust your past self. And vice versa. If your future self has a stroke tomorrow, did your past self remember to write a living will? And renew it regularly? Will your future self remember that password? What if the kid pukes on the carpet before your past self writes it down?

Your current self is not statistically reliable. Andrej Karpathy administered an imagenet challenge to himself, his brain as the machine: he got about 95%.

I'm sure there are other classes of self-failure.


Given the code quality of projects like nextcloud. Suggestions like this makes the head and table transmugify into magnets.

The odds that I make a mistake in my security configuration are much higher than the odds that Apple is maliciously backdooring themselves.

The PCC model doesn't guarantee they can't backdoor themselves, but it does make it more difficult for them.


You also don't have a security team and Apple does have one.

> "you have to trust us."

You have fundamentally misunderstood PCC.


I don't even trust myself, I know that I'm going to mess up at some point or another.



Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: