Date: Mon, 04 Jan 1999 21:44:21 +0100 From: Poul-Henning Kamp <phk@critter.freebsd.dk> To: "Jordan K. Hubbard" <jkh@zippy.cdrom.com> Cc: Mike Smith <mike@smith.net.au>, Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, Tom Bartol <bartol@salk.edu>, current@FreeBSD.ORG Subject: Re: New boot blocks for serial console ... Message-ID: <15625.915482661@critter.freebsd.dk> In-Reply-To: Your message of "Mon, 04 Jan 1999 12:21:51 PST." <39041.915481311@zippy.cdrom.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <39041.915481311@zippy.cdrom.com>, "Jordan K. Hubbard" writes: >> They will guarantee that you will not get access to anything in >> the computer. Last perimeter will inject 220V (mains) through >> vital bits of the computer (including your flash disk) if broken. > >I'm curious how many codicils there are in their contract about >"tamper-proof", however. They are graded like bank safes, "number of hours minimum resistance to best known state of the art attack", starting at 4 going up to 168 in this somewhat old catalog". But I think we're getting sidetracked from bootcode here aren't we ? -- Poul-Henning Kamp FreeBSD coreteam member phk@FreeBSD.ORG "Real hackers run -current on their laptop." "ttyv0" -- What UNIX calls a $20K state-of-the-art, 3D, hi-res color terminal To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?15625.915482661>