Date: Mon, 04 Jan 1999 20:35:59 +0100 From: Poul-Henning Kamp <phk@critter.freebsd.dk> To: Mike Smith <mike@smith.net.au> Cc: "Jordan K. Hubbard" <jkh@zippy.cdrom.com>, Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, Tom Bartol <bartol@salk.edu>, current@FreeBSD.ORG Subject: Re: New boot blocks for serial console ... Message-ID: <15269.915478559@critter.freebsd.dk> In-Reply-To: Your message of "Mon, 04 Jan 1999 11:26:09 PST." <199901041926.LAA14171@dingo.cdrom.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <199901041926.LAA14171@dingo.cdrom.com>, Mike Smith writes: >> >> No, you bet it is tamper-PROOF. >> >> They will guarantee that you will not get access to anything in >> the computer. Last perimeter will inject 220V (mains) through >> vital bits of the computer (including your flash disk) if broken. >> >I recommend you find and read a copy of the very excellent, if somewhat >dated, "Danger UXB" before being quite so certain. And consider; you >still have to be able to open it for maintenance - if a direct physical >approach is inefficient, hack the supporting organisation. That was not what we discussed, we discussed if you could get tamper-PROOF hardware :-) -- Poul-Henning Kamp FreeBSD coreteam member phk@FreeBSD.ORG "Real hackers run -current on their laptop." "ttyv0" -- What UNIX calls a $20K state-of-the-art, 3D, hi-res color terminal To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?15269.915478559>