Date: Tue, 05 Jan 1999 07:47:46 +0900 From: "Daniel C. Sobral" <dcs@newsguy.com> To: Poul-Henning Kamp <phk@critter.freebsd.dk> Cc: "Jordan K. Hubbard" <jkh@zippy.cdrom.com>, Mike Smith <mike@smith.net.au>, Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, Tom Bartol <bartol@salk.edu>, current@FreeBSD.ORG Subject: Re: New boot blocks for serial console ... Message-ID: <36914512.88F25E22@newsguy.com> References: <15625.915482661@critter.freebsd.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
Poul-Henning Kamp wrote: > > In message <39041.915481311@zippy.cdrom.com>, "Jordan K. Hubbard" writes: > >> They will guarantee that you will not get access to anything in > >> the computer. Last perimeter will inject 220V (mains) through > >> vital bits of the computer (including your flash disk) if broken. > > > >I'm curious how many codicils there are in their contract about > >"tamper-proof", however. > > They are graded like bank safes, "number of hours minimum resistance > to best known state of the art attack", starting at 4 going up to > 168 in this somewhat old catalog". > > But I think we're getting sidetracked from bootcode here aren't we ? True enough. How do these things boot? And will they run FreeBSD? :-) -- Daniel C. Sobral (8-DCS) dcs@newsguy.com "Heart like a Gabriel, pure and white as ivory, soul like a lucifer, black and cold as a piece of lead." To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?36914512.88F25E22>