Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

PCC is a whole different level. For example, you still have to trust that Google is doing what it says to control access. PCC makes it auditable and verifiable by clients when connecting to a node.

You can also audit that the binaries don’t leak any data in, say, debug logs, which is definitely possible on GCP/Borg. PCC nodes are “cryptographically airtight.”



I'm only here to correct the parent's false claims.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: