From owner-freebsd-current Mon Jan 4 10:42:31 1999 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id KAA16873 for freebsd-current-outgoing; Mon, 4 Jan 1999 10:42:31 -0800 (PST) (envelope-from owner-freebsd-current@FreeBSD.ORG) Received: from critter.freebsd.dk (critter.freebsd.dk [212.242.40.131]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id KAA16859 for ; Mon, 4 Jan 1999 10:42:26 -0800 (PST) (envelope-from phk@critter.freebsd.dk) Received: from critter.freebsd.dk (localhost [127.0.0.1]) by critter.freebsd.dk (8.9.1/8.8.5) with ESMTP id TAA14876; Mon, 4 Jan 1999 19:38:47 +0100 (CET) To: "Jordan K. Hubbard" cc: Garrett Wollman , Tom Bartol , current@FreeBSD.ORG Subject: Re: New boot blocks for serial console ... In-reply-to: Your message of "Mon, 04 Jan 1999 10:09:05 PST." <38397.915473345@zippy.cdrom.com> Date: Mon, 04 Jan 1999 19:38:46 +0100 Message-ID: <14874.915475126@critter.freebsd.dk> From: Poul-Henning Kamp Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG In message <38397.915473345@zippy.cdrom.com>, "Jordan K. Hubbard" writes: >> Not at all. Ever heard of a padlock? > >Give me physical access to your machine, with or without a padlock, >and I'll have root on that baby before you have a chance to come back >from lunch. > >I think the original comment that there's no security without physical >security has definite merit. The NSA learned this decades ago! :) Uhm, well there is, but it is called "tamper-proof hardware" and costs a fortune. -- Poul-Henning Kamp FreeBSD coreteam member phk@FreeBSD.ORG "Real hackers run -current on their laptop." "ttyv0" -- What UNIX calls a $20K state-of-the-art, 3D, hi-res color terminal To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message