Back to the main page

Mailing List Logs for ShadowRN

From: Craig J Wilhelm Jr <craigjwjr@*********.NET>
Subject: Re: Hacking Security Tallies (Was Re: Weird Campaigns)
Date: Tue, 26 May 1998 17:01:59 -0400
Mike Elkins wrote:
> Before people use this to design un-hackable computers, remember that
> anything in hardware must be designed in when the machine is
> designed, and can never be changed or updated.

Good point. One other thing to consider if you use this idea, is that
since upgrading this kind of system will be realatively hard, and
expensive, they will rarely be SOTA. Not far behind SOTA but very likely
not spot on SOTA.

--
Craig "Knee Deep in the Blood of Swine" Wilhelm
Inside every living human being, there's a dead one waiting to come out.
UIN: 1864690
-------------BEGIN GEEK CODE BLOCK-------------
v3.12
GAT/$ d- s+:+ a- C+++ U--- P+ L- E-- W++ N++
o K- w+ O> !M-- !V PS+ PE Y+ PGP++ t--- 5+++
X-- R++ tv b++ DI-- D+(Q2++) G++ e++ h* r y++**
--------------END GEEK CODE BLOCK--------------

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.