Hello *,
in case anybody still needs reading matter, https://mjg59.dreamwidth.org/57199.html might be worth a lecture - if you trust the (x86) hardware, that is. :-)
Thanks, and best regards, Peter Müller
Hello,
I have seen this article as well, but I did not take away much from it.
It says to me:
* You cannot trust hardware * You cannot trust firmware
And so any software running on top of that cannot validate itself. We just have to hope for the best.
-Michael
On 2 Jun 2021, at 22:25, Peter Müller peter.mueller@ipfire.org wrote:
Hello *,
in case anybody still needs reading matter, https://mjg59.dreamwidth.org/57199.html might be worth a lecture - if you trust the (x86) hardware, that is. :-)
Thanks, and best regards, Peter Müller
Hi,
Michael you are right.
Am 03.06.2021 um 14:40 schrieb Michael Tremer:
Hello,
I have seen this article as well, but I did not take away much from it.
It says to me:
- You cannot trust hardware
- You cannot trust firmware
You can't verify hardware and firmware, because you do not get a complete description, which is necessary despite of comülexity.
And so any software running on top of that cannot validate itself. We just have to hope for the best.
Software itself can be verified in most parts, theoretically. But it a matter of complexity whether this can be done in an adequate time. What can't be verified is the implementation, see above.
- Bernhard
-Michael
On 2 Jun 2021, at 22:25, Peter Müller peter.mueller@ipfire.org wrote:
Hello *,
in case anybody still needs reading matter, https://mjg59.dreamwidth.org/57199.html might be worth a lecture - if you trust the (x86) hardware, that is. :-)
Thanks, and best regards, Peter Müller