Back to the main page

Mailing List Logs for ShadowRN

From: Mike Elkins <MikeE@*********.COM>
Subject: Re: Hacking Security Tallies (Was Re: Weird Campaigns)
Date: Tue, 26 May 1998 11:27:02 -0500
Gurth wrote:
>But there's still a part that depends on software -- some or another
>routine has to check whether the key is in the computer. If you can
>fool that, you're as good as there. (Except for defeating any IC that
>may be sitting around the security tally...)

No, not if you design it correctly. If hardware controls access to that
section of memory or whatever, then there is no amount of software
changing that can modify it.

Before people use this to design un-hackable computers, remember that
anything in hardware must be designed in when the machine is
designed, and can never be changed or updated. Also, good design
practices indicate that you should keep this part as simple as possible.
Putting ICE there probably wont work. Putting a simple listing of what
ICE should exist on the system probably would.

Double-Domed Mike

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.