From owner-freebsd-current Mon Jan 4 11:39:52 1999 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id LAA23763 for freebsd-current-outgoing; Mon, 4 Jan 1999 11:39:52 -0800 (PST) (envelope-from owner-freebsd-current@FreeBSD.ORG) Received: from critter.freebsd.dk (critter.freebsd.dk [212.242.40.131]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id LAA23752 for ; Mon, 4 Jan 1999 11:39:47 -0800 (PST) (envelope-from phk@critter.freebsd.dk) Received: from critter.freebsd.dk (localhost [127.0.0.1]) by critter.freebsd.dk (8.9.1/8.8.5) with ESMTP id UAA15271; Mon, 4 Jan 1999 20:36:01 +0100 (CET) To: Mike Smith cc: "Jordan K. Hubbard" , Garrett Wollman , Tom Bartol , current@FreeBSD.ORG Subject: Re: New boot blocks for serial console ... In-reply-to: Your message of "Mon, 04 Jan 1999 11:26:09 PST." <199901041926.LAA14171@dingo.cdrom.com> Date: Mon, 04 Jan 1999 20:35:59 +0100 Message-ID: <15269.915478559@critter.freebsd.dk> From: Poul-Henning Kamp Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG In message <199901041926.LAA14171@dingo.cdrom.com>, Mike Smith writes: >> >> No, you bet it is tamper-PROOF. >> >> They will guarantee that you will not get access to anything in >> the computer. Last perimeter will inject 220V (mains) through >> vital bits of the computer (including your flash disk) if broken. >> >I recommend you find and read a copy of the very excellent, if somewhat >dated, "Danger UXB" before being quite so certain. And consider; you >still have to be able to open it for maintenance - if a direct physical >approach is inefficient, hack the supporting organisation. That was not what we discussed, we discussed if you could get tamper-PROOF hardware :-) -- Poul-Henning Kamp FreeBSD coreteam member phk@FreeBSD.ORG "Real hackers run -current on their laptop." "ttyv0" -- What UNIX calls a $20K state-of-the-art, 3D, hi-res color terminal To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message