Tag: threat models
-
UPDATE - 20170902 - Typos, finding emergency exits.
So, after many years I've decided that it's my turn to write a first-timer's guide to Defcon. There are many like it, so I'll try to be as frank as I can about the topic. I'm going to try to write for people who've never been to Defcon before (but may have been to other hacker cons). I'm not going to lie or joke around (which some of the guides tend to do) and give as much personal advice as I can. I'm also going to try to not sound like your parents, because …
Read more...
-
The next phase of the trusted open computer project is actually manufacturing usable integrated circuits that you can plug into a circuit board, apply power to, and use to do whatever it is that you do. In other words, processing information.
I hate to be a killjoy, but this is really hard. A vital question that we have to ask at this point is whether or not this is the point at which the project is pwnable by a determined third party. Fabbing integrated circuitry on silicon wafers is, to be gentle, a nontrivial process. Here are a couple of …
Read more...
-
I've been sent on the road again for work, this time to the west coast, and the lovely region of California called Palo Alto. It's 0606 EST as I begin writing this from my increasingly infirm partner in crime Windbringer from one of the Z gates of Dulles International. Security was a nightmare this morning - not only does everyone and their backup seem to be hitting the friendly skies this morning, but the physical security detail seems to have changed its strategies once again. Now they are inspecting boarding passes and presented identification with both ultraviolet lamps and magnifying monocles …
Read more...