From owner-freebsd-current Mon Jan 4 12:26:43 1999 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA29526 for freebsd-current-outgoing; Mon, 4 Jan 1999 12:26:43 -0800 (PST) (envelope-from owner-freebsd-current@FreeBSD.ORG) Received: from zippy.cdrom.com (zippy.cdrom.com [204.216.27.228]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA29520 for ; Mon, 4 Jan 1999 12:26:40 -0800 (PST) (envelope-from jkh@zippy.cdrom.com) Received: from zippy.cdrom.com (localhost.cdrom.com [127.0.0.1]) by zippy.cdrom.com (8.9.1/8.9.1) with ESMTP id MAA39045; Mon, 4 Jan 1999 12:21:52 -0800 (PST) To: Poul-Henning Kamp cc: Mike Smith , Garrett Wollman , Tom Bartol , current@FreeBSD.ORG Subject: Re: New boot blocks for serial console ... In-reply-to: Your message of "Mon, 04 Jan 1999 20:14:25 +0100." <15157.915477265@critter.freebsd.dk> Date: Mon, 04 Jan 1999 12:21:51 -0800 Message-ID: <39041.915481311@zippy.cdrom.com> From: "Jordan K. Hubbard" Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG > They will guarantee that you will not get access to anything in > the computer. Last perimeter will inject 220V (mains) through > vital bits of the computer (including your flash disk) if broken. I'm curious how many codicils there are in their contract about "tamper-proof", however. Let's suggest, for example, that the mains power is cut first and then the box is carefully breached by someone highly skilled at bomb disposal and the disabling of anti-handling devices and such. If they can remove the flash disk, they've pretty effectively compromised the data if not the machine's ongoing operations. Is that specifically excluded by their contract, or what exactly? - Jordan To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message