IMO, the I/O part is not about the lack of such a channel, but rather the lack of a channel that is invulnerable to hacking/modification, such that the channel can be assumed to only come from a certain source.
You could always create such a channel, though it isn’t fundamental, but rather that you can’t create a channel that isn’t able to be modified/hacked, such that the channel can be assumed to only come from a certain source.
IMO, the I/O part is not about the lack of such a channel, but rather the lack of a channel that is invulnerable to hacking/modification, such that the channel can be assumed to only come from a certain source.
You could always create such a channel, though it isn’t fundamental, but rather that you can’t create a channel that isn’t able to be modified/hacked, such that the channel can be assumed to only come from a certain source.
I like dxu’s comment:
https://www.lesswrong.com/s/Rm6oQRJJmhGCcLvxh/p/zcPLNNw4wgBX5k8kQ#uFdZuNY3XxBBakLv7