our threat model at this point has been that once somebody controls the binaries running on your com...
i
our threat model at this point has been that once somebody controls the binaries running on your computer, you’ve already lost