>>16381>since this does nothing but weakly enforce open sourceEncrypting the chip architecture makes it much harder to put backdoors into hardware, and you can scale down microchip-fab security from ultra paranoid to regular paranoid. If you combine this with virtualization and make it so that the virt-host and virt-guest system run on processor cores with different hardware encryption keys , it will become next to impossible for malware to break through virtualization layers.
Security patching will also become more economical and faster when malware has to distribute it self as source-code, because the step of reverse engineering binaries can be omitted.
The only real downside to this is that each piece of software gets compiled billions of times, and that's wasting a lot of compute cycles, and energy for battery powered devices. Adding something like a hardware accelerator feature for compiling software is necessary.
Current Computer security designs are getting better at preventing weaknesses in memory allocation , so the next target is going to be weaknesses in software logic, and this architecture encryption might be good at mitigating that.