So, the problem with USB tokens that we basically have two choices: - Unauditable black boxes built on *supposedly* more secure ICs that require NDAs to develop for - Open and auditable, but definitely pwnable off the shelf microcontrollers. Which poison do you prefer?
-
Show this thread
-
Replying to @marcan42
What about "crowdfund a F/OSS secure element, fully open (GDS is on github) on a mature process like UMC 180nm using scalable lambda rules"?
2 replies 0 retweets 7 likes -
Replying to @azonenberg @marcan42
There is also the option of more traditional physical anti tamper protection, potentially also with a battery. The result would be physically larger but probably OK for a lot of people.
1 reply 0 retweets 0 likes -
Replying to @enginetankard @marcan42
Yes, full PCIe HSMs etc are an interesting regime. I saw some very cool Virtex-6 based hardware from a major Wall Street company a while back. I'd love to try my hand at designing one some day.
1 reply 0 retweets 0 likes
I've given some thought to centralizing secret management on effectively an off the shelf SBC (using remote U2F and the like to log in) and then seeing how much you can tamper-proof it physically. There's also betrusted: https://betrusted.io/betrusted-architecture/#custom-soc …
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.