Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:what a load. (Score 1) 68

Some more comments on your replies: .............. so you cut corners and probably made a deal with Intel. Do you really think Intel would make a deal with us? We are applying the most open design practices we can think off, while still staying in business. We publicized the product definition, the SOW for contractors we work with, the code for the several Firmware developments we did and have contracted out will be available as soon as it is in Beta release. the Hardware design is open to the public and ready for anyone's scrutiny. Do you really think we would do all that to "make a deal with Intel"? I invite you to read up on this article from Bruce Byfield on open hardware development. http://www.linux-magazine.com/... .............. You cannot minimize the reach of ME because it load before everything else. If you believe that you have then you are either ignorant or you have deluded yourself. I cannot guarantee to which extend we will be able to minimize the ME implementation or reach, initial discussion with out BIOS implementer Eltan, showed there are choices we can make choosing different TyanoCore Payloads to get the system up ==> minimizing ME capabilities. Then there are a number of other options which we are still investigating, more on this as soon as we know. ............... no they don't because anything with ME is not actually secured. I want to point you to the Intel website where they advertise for POS systems based on their chipset. http://www.intel.com/content/w... Thanks

Comment Re:Is Intel Skylake secure? (Score 1) 68

It is very hard to implement a system that solves all problems at once, all done open source, without any involvement of any of the known software and semiconductor players. We are making good progress towards opening up closed code bases and hardware designs. I think Bruce Byfield is making this point much better than I can. https://t.co/pBeRkE7ajp [t.co] Thanks

Comment Re:This is a joke- you can't seriously call it sec (Score 1) 68

It is very hard to implement a system that solves all problems at once, all done open source, without any involvement of any of the known software and semiconductor players. We are making good progress towards opening up closed code bases and hardware designs. I think Bruce Byfield is making this point much better than I can. https://t.co/pBeRkE7ajp Thanks

Comment Re:Several ways in, or it's useless (Score 2) 68

Let me answer to some of the points you make. 1/2 inch holes through the mesh..... Unnoticed. This is a picture of the mesh we implemented. Both trace width and pitch are sub millimeter. A secure microcontroller monitors the integrity of them with pseudo random signals. http://media.bestofmicro.com/I... USB and uHDMI not covered by the security mesh. As you can see in the image, the actual connectors are excluded from the mesh, any connection to the main board is covered by the mesh. So yes, you can try your luck with the USB connections. The USB ports as all physically disconnected as soon as the user is further away from the device than 10meters. So you would deal with two dead USB connections. If you move the device while the user is further away than 10meters it will force a shutdown of the Intel Subsystem. We are trying to make it really really hard to gain access to the device and your data. Thanks

Comment Re:what a load. (Score 1) 68

We thought about the platform selection for a long time. In the end the compatibility with existing infrastructure, OS support .... pushed us in the Intel direction. While some features like ME is certainly less than desirable, we think we 1) minimized the reach of ME to a good extent with our secure micro controller having control of power of the Intel system 2) Most secure solutions today rely on Intel today 3) we are further minimizing the ME reach through our Coreboot development and utilizing the most constrained ME configuration we can achieve. Thanks

Comment Re:What? (Score 1) 68

This device is intended for keeping unauthorized away from your PC. If your data is better off lost than sacrificed you will want to follow the "single copy only" approach. If you are in need of keeping yourself a meaningful back up copy, you may want to make an external copy and apply a different password to this SSD/HD. Now if the odd thing happens and you are in need of the back up you can access it independently. Thanks

Comment Re:... formerly most secure computer (Score 1) 126

You are correct, It will take much more that $25k to get all this done, it took much more than that to get to where we are today. We have working prototypes today that we use to finish the development. The Crowd Supply campaign for us is to get attention and get a number of devices into peoples hands, to play and develop on them before anyone else at a lower cost than retail later.

Comment Re:Nope. (Score 1) 126

If you are motivated to read the one side of the story, I want to invite you to read the other side too. Our update to Joanna's assessment. https://www.crowdsupply.com/de... Enjoy and be critical. While we put a lot of thought into this machine, we by no means pretend to have it all figured out. Community and collaboration will make this product better and will allow you to trust it, when it is all done.

Comment Re:Interesting concept, but... (Score 1) 126

I think there is a misunderstanding in which events trigger a loss of all SSD data. any tampering with the device HW, like drilling the protective shell (not the glass), prying the shells off the PCB, freezing the pcb+components, the backup battery runs low on juice (after ~6months without power connection) If the device is moved while the KeyFOB is out of range, the device will shut down but not wipe your data. It's nothing but a forced shut down.

Comment Re:... formerly most secure computer (Score 1) 126

Need to clarify! >>a setting that will wipe or lock down the PC's data if it is moved to another location... So, if there's a bug in the security program, or in the operating system, or in the sensors, it wipes your data. >> I think there is a misunderstanding in which events trigger a loss of all SSD data. any tampering with the device HW, like drilling the protective shell (not the glass), prying the shells off the PCB, freezing the pcb+components, the backup battery runs low on juice (after ~6months without power connection) If the device is moved while the KeyFOB is out of range, the device will shut down but not wipe your data. It's nothing but a forced shut down

Comment Re:... formerly most secure computer (Score 1) 126

To clarify, ORWL has WiFi and Bluetooth connectivity that is accessible to the OS, Ethernet you can get through RJ-45. There is NFC and another BT available only to the secure element for authentication purposes. Out of Box, you will need to go through 1st authorization process, that verifies that the device has not been tampered with and you receive what we sent. Exactly.

Slashdot Top Deals

"This generation may be the one that will face Armageddon." -- Ronald Reagan, "People" magazine, December 26, 1985

Working...