Good to see your work on this! I’ll avoid jumping in on weighing this relative to other problems as it’s not the core of your post.
Rudolf and I are proponents of alignment to the user, which seems very similar to your second suggestion. Do you think there’s a difference in the approach you outline vs the one we do? I’m considering doing a larger write-up on this approach, so your feedback would be helpful.
Nope, not claiming my proposal here is different from “alignment to the user”. I probably should have made this clear. I wasn’t trying to claim the interventions were novel approaches (though I think mandatory interoperability is), just that my prioritization/highlighting was novel.
Good to see your work on this! I’ll avoid jumping in on weighing this relative to other problems as it’s not the core of your post.
Rudolf and I are proponents of alignment to the user, which seems very similar to your second suggestion. Do you think there’s a difference in the approach you outline vs the one we do? I’m considering doing a larger write-up on this approach, so your feedback would be helpful.
Nope, not claiming my proposal here is different from “alignment to the user”. I probably should have made this clear. I wasn’t trying to claim the interventions were novel approaches (though I think mandatory interoperability is), just that my prioritization/highlighting was novel.
My guess is for the prioritization work in particular, it would be useful to understand the threat model better.
Seems right, I just had some thoughts which seemed maybe useful so I decided to quickly write them up.
(Rudolf encouraged me to post as a top level post, I was initially going to post as a quick take.)