News: 0000838176

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Huang: Evaluating Precursor’s Hardware Security

([Security] Nov 23, 2020 18:06 UTC (Mon) (corbet))


For those who are interested in security at the hardware level, [1]this blog post from Andrew 'bunnie' Huang is well worth a read. " Despite any claims you may have heard otherwise, tamper resistance is a largely unsolved problem. Any secrets committed to a non-volatile format are vulnerable to recovery by a sufficiently advanced adversary. The availability of near-atomic level microscopy, along with sophisticated photon and phonon based probing techniques, means that a lab equipped with a few million dollars worth of top-notch gear and well-trained technicians has a good chance of recovering secret key material out of virtually any non-volatile storage media. The hard part is figuring out where the secrets are located on the chip. "



[1] https://www.bunniestudios.com/blog/?p=5979

Huang: Evaluating Precursor’s Hardware Security

[1]Ken Shirriff's blog is probably a good example of this .

[1] https://www.righto.com/

Huang: Evaluating Precursor’s Hardware Security

[1]Ken Shirriff's blog is probably a good example of this .

[1] https://www.righto.com/

Are you perchance running on a 64-bit machine?
-- Larry Wall in <199711102149.NAA16878@wall.org>