??? 06/01/12 22:25 Read: times |
#187602 - so Mr Evil Hacker gets his keys Responding to: ???'s previous message |
What's he going to do ?
reverse engineering the configuration bit stream of an FPGA, I couldn't even guess how long that might take, then you are presented with a schematic with a couple of million logic gates and the game is determine what it does. O.K so several years later you can read the logic and work out what it does, now you can implant your evil logic bomb in the code, only slight problem is it only works on the one on your desk, hmmmm you could hack into the SVN server of the producer and replace their production code with your evil code, they might not notice. As an evil plan goes its not very good. this is why the whole premise is flawed, people only use encrypted configuration bit streams to prevent their I.P from being stolen. The second problem is the sort of product where they really really don't want Mr Evil Hacker to look at the code, are not for sale commercially and are only available to governments and their agencies. This is why I think this company is a typical dodgy Cambridge university spin off, they don't even have a phone number. |
Topic | Author | Date |
have you seen this? | 01/01/70 00:00 | |
Backdoor access | 01/01/70 00:00 | |
What's the big deal? | 01/01/70 00:00 | |
Crypto keys | 01/01/70 00:00 | |
High security chips | 01/01/70 00:00 | |
IP theft | 01/01/70 00:00 | |
as far as IP theft is concerned ... | 01/01/70 00:00 | |
Its really | 01/01/70 00:00 | |
Biggest problems is still processor copy-protection | 01/01/70 00:00 | |
so Mr Evil Hacker gets his keys | 01/01/70 00:00 | |
Mr Evil Hacker is most definitely busy | 01/01/70 00:00 | |
Who writes that crap? | 01/01/70 00:00 | |
Don't think so much about modification as in extraction | 01/01/70 00:00 | |
The people who write that crap... | 01/01/70 00:00 | |
c'mon, Jez! | 01/01/70 00:00 | |
Never mind who writes it .... | 01/01/70 00:00 | |
Right on! | 01/01/70 00:00 |