Agreed. The more access you get, the more attack/threat vectors you create. More doors = more locks to look after = more opprotunities for a break in.
Its why I’m hessitant about these neural chips elon’s developing. Taking something that is in a closed network, ie a brain in this case, and exposing it to the public network, you risk compromising that system.
It’s kind of like your going from isolated individual to artificial hivemind.
Imagine getting a neurological equivilant to a ransomware attack. Pay a large lumpsum or become at least amnesic, and at worst, a comatose-like brain dead state?
I’m good with just using a medium of connection, like smartphones. That natural barrier is fine by me. I feel like I digressed oops.
Anyways, that isn’t saying it can’t be done of course. I think for TW, you’d want to implement sandboxing, where you have conttol over which things can do what. Like granting permissions on a smartphone, or like qubes os, since we’re on the topics of operating systems.
A tiddler for file browsing that can only view and modify the files, not add or remove, a tiddler for file creation / removal functions, a tiddler for web browsing, that cannot interact with any other tiddlers except by way of an approved temp tiddler, that self wipes after each use, and at the root running the shows your core tiddlers.
Keeping it all isolated means that if one or multiple is co.promised, if they are shadow tiddlers, juzt delete them to reset them. Minor set back, but not a fully compromised and protentially dangerous system on your hands.