Hacker News new | past | comments | ask | show | jobs | submit login

And even if you did this, which may in principle be possible, you still wouldn’t be able to prove that there aren’t any backdoors leveraging unexpected physical interactions between components.

For example, even if everything was provably manufactured to spec, it could be laid out in a way that exposes side channels, enables rowhammer-like attacks, and so on.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: