Where can I read about how Curiousity’s hardware and software works at a low level so things like communications still work in safe mode? Truly fascinating engineering.
Could someone who's read both compare the two books that have been linked? The !GP one sounds much more technical going by reviews on Amazon. The GP one sounds more about the organizational challenge (both are interesting).
I haven't read either, but Emily Lakdawalla's book is published by Springer Praxis, and I find that their books tend to be satisfyingly technical and detailed.
Yes - several, at varying degrees of fidelity, the highest of which is an exact replica rover named MAGGIE that lives in the garage next to the JPL “Mars Yard”.
Debugging a system like this must very scary because of the tremendous responsibility. It is intersting to know how they actually communicate with it and handle auth.
It might not be authenticated. For some NASA probes, they just figured that any attacker would need control of a global network of high-gain radio antennas, and there aren't very many of those. Physical security at DSN tracking sites is sufficient in most cases.
I wonder if this threat vector will change as more countries become space bound. Curious to see the JPL Security Coding Guidelines, whenever that is written.
AES-256 on both uplink and downlink sides. It's fast enough and the NSA thinks it's good enough. Put a timestamp inside the cleartext to prevent replay attacks and re-key the encryption module every so often to prevent cryptoanalysis from breaking your current key.
Does anyone have more info on this? From what I recall there are mirrored systems with duplicate CPUs, memory, flash, etc. In the event of issues with one computer, they failover to the second. Was this an issue with something on the "A/primary", "B/backup" computer, or something more global?