They are extremely vague here about what the actual connection is. Is it IPsec with a PQ-safe algorithm? How are keys actually exchanged? How are they stored on the hardware?
This could potentially be really cool... but with the information we have, I can't imagine how anyone could actually look at this as a serious product for consideration.
Jumping from "oh my gosh you can (incorrectly) reimplement ls from a trace of syscalls" to "this means the end of binary blobs" is a level of detachment from reality I've most recently seen from Geoff Lewis. Never mind that the author mixes up eBPF tracing and strace.
If you were the CEO of one of his companies, what would you do to limit his ability to access your corporate information and people at this point? Forget whether or not you invite him to a board meeting….
I’ve found it very helpful in the same vein as RFC 2119 terminology (MUST, SHOULD, MAY, etc.); when you need your meanings to be understood by a counterparty and can agree on a common language to use.