> When the above attack model is extended to include multiple clients independently updating the same repository, then Borg fails to provide confidentiality
Are you still looking for candidates? After last month's post saying that some emails were missed, I applied again (and then once more this month), but I have yet to receive a reply indicating my application was received.
It has wireless charging and NFC build into the base, wow! That's really well thought out. I'm not too sold on the iMac-style monitor computers, but I admit they seems to have done a lot right when making the Vivo AiO.
I don't have too much knowledge of ARM, but from what I hear the errata are surprisingly few in number (compared to say, an x86 cpu).
Also, that is not to say companies like ARM are only recently verifying their chips. This is only in regards to formal validation, which others have explained the circumstances of pretty well. There are still entire teams dedicated to code and functional validation.
Good points, but I just wanted to point out that we are only missing a 4 kHz range (20-24 kHz) as the highest frequency a 48 kHz digital signal can represent is 24 kHz (Nyquist sampling theorem).
MP3s actually tend to have a worse cutoff depending on encode settings, with values from 20.5 down to 16 kHz [1].
The MAC should prevent the remote server changing the counter or any encrypted bits.