> Given that many use-cases (e.g. Cilium) generate trusted BPF programs, > trusted loaders are an inevitability and a requirement for signing support, a > entrusting loader programs will be a fundamental requirement for an security > policy. So I've been following this discussion a bit on the sidelines, and have a question related to this: