TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Permissive Action Links – how nuclear weapons are secured

33 pointsby asciilifeformover 12 years ago

4 comments

wshover 12 years ago
This blog item appears to have been plagiarized from Steve Bellovin's page:<p><a href="https://www.cs.columbia.edu/~smb/nsam-160/pal.html" rel="nofollow">https://www.cs.columbia.edu/~smb/nsam-160/pal.html</a>
评论 #5176127 未加载
harshrealityover 12 years ago
What does the PAL do when it detects unauthorized tampering?<p>For fission weapons, isn't the most critical part the core? One design criterion for a PAL is to prevent scattering of fissile material, so the core remains intact, right? How hard can it be for a rogue state or group to create a new bomb given that the fissile core is the most valuable part of a fission bomb?<p>For a fusion bomb, I guess the PAL would damage the aerogel ("fogbank") among other things. That would take some advanced knowledge to redesign, but whoever has the weapon would still have the fissile material from the first stage even if they can't get the fusion part of humpty dumpty back together again.<p>The original fission bombs were designed in the 1940s with slide rules. It seems to me that PALs do a better job of protecting against unauthorized fusion detonations than of protecting against unauthorized re-engineering of the bombs into fission or radiological versions using the fission core.
评论 #5175259 未加载
评论 #5176137 未加载
评论 #5174989 未加载
darienover 12 years ago
I like the part where it says "the secret unlock code was set to 00000000." Some things never change.
rdlover 12 years ago
PALs and the START tamper sensors are some of the most amazing implementations of tamper resistance in the history of mankind. They are what got me interested in the stuff in the mid 1990s, followed by the weirdness of DRM schemes for anti piracy.