Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 04 Jan 1999 20:35:59 +0100
From:      Poul-Henning Kamp <phk@critter.freebsd.dk>
To:        Mike Smith <mike@smith.net.au>
Cc:        "Jordan K. Hubbard" <jkh@zippy.cdrom.com>, Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, Tom Bartol <bartol@salk.edu>, current@FreeBSD.ORG
Subject:   Re: New boot blocks for serial console ... 
Message-ID:  <15269.915478559@critter.freebsd.dk>
In-Reply-To: Your message of "Mon, 04 Jan 1999 11:26:09 PST." <199901041926.LAA14171@dingo.cdrom.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <199901041926.LAA14171@dingo.cdrom.com>, Mike Smith writes:
>> 
>> No, you bet it is tamper-PROOF.
>> 
>> They will guarantee that you will not get access to anything in
>> the computer.  Last perimeter will inject 220V (mains) through
>> vital bits of the computer (including your flash disk) if broken.
>> 
>I recommend you find and read a copy of the very excellent, if somewhat 
>dated, "Danger UXB" before being quite so certain.  And consider; you 
>still have to be able to open it for maintenance - if a direct physical 
>approach is inefficient, hack the supporting organisation.

That was not what we discussed, we discussed if you could get
tamper-PROOF hardware :-)

--
Poul-Henning Kamp             FreeBSD coreteam member
phk@FreeBSD.ORG               "Real hackers run -current on their laptop."
"ttyv0" -- What UNIX calls a $20K state-of-the-art, 3D, hi-res color terminal

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?15269.915478559>