Deleted No
Hibernated No
Last Checked Nov. 19, 2022

Created

Fri Oct 04 11:30:53 +0000 2019

Likes

16

Retweets

1

Source

TweetDeck

View Raw Data

JSON Data

View on Twitter

Likely Available
Profile Image

Joanna Rutkowska @rootkovska

In general solutions would fall into: 1. Try to make plugins non-malicious (white-listing, safe-compiling, constrained API), 2. Assume plugins are malicious and sandbox (prevent I/O to Internet, etc), 3. Build in an inevitable punishment mechanism for offenders (e.g. staking) — PolitiTweet.org

Posted Oct. 4, 2019