Reply to post: Re: The hardware underneath

Meet the open sorcerers who have vowed to make Facebook history

Jack of Shadows Silver badge

Re: The hardware underneath

The roll-your-own movement is still alive and kicking as a direct result of governmental overreach. They are a solid part of the people I hang out with on the weekends. There already exist CPU's which have been verified as being per specifications, without additions. Operating system kernels formally verified. Each program as well. And so forth as we work up the stack. Note: Everything outside the device is considered insecure. There's some special theories about securing communications beyond the end point, considered an essential feature in the face of a determined attacker.

There's also a solid group trying to figure out ways to operate in an environment where you can't trust any device or its components. That group is operating at a level that loses me. I really need to upgrade my maths to correspond to what they are practicing.

Interesting problems and it's not like I have much else to do these days.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2019