@datapulte Les projets comme USBArmory sont des impostures sur le plan technique, c'est du libre Canada Dry ou seul l'OS interne est libre.
@stmanfr @datapulte no worries :), specifically re BadUSB the SoC Boot ROM can be inspected and there is no persistence on SoC
-
-
@stmanfr @datapulte therefore it is fair to say that malicious flashing capabilities can be very well assessed and ruled out in our opinion -
@stmanfr @datapulte we did audit the SoC that we use, being you know hw auditors too, and we consider it a good choice -
@stmanfr @datapulte also all other components are passive and their electrical role is easy to identify and inspect, attack surface is low -
@AndreaBarisani device logic made out of finite state machines in cabled logic into an FPGA. That was ly point, indeed. @datapulte -
@stmanfr @datapulte theoretically you are right, we just wanted to do something practical and not in the realm of science fiction ;) -
@AndreaBarisani market AND priorities : If 100% security is your goal, it worth it. But this was NOT your primary goal. @datapulte -
@stmanfr @datapulte I don't believe in 100% security and I don't believe that the approach you describe can be achieved "100%" anyway. -
@AndreaBarisani You are wrong on that last point. It is already done by several designs on OpenCores and I am also doing it. It @datapulte
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.