TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Modchips of the State

101 点作者 Adrock超过 6 年前

4 条评论

kw71超过 6 年前
I think I found some flaws with this, now I think I am rather experienced but I haven&#x27;t seen everything.<p>1) He didn&#x27;t demonstrate it in real hardware without outside power and ground, while he says an arm core is very small, capacitors are large unless you change the laws of physics. Also I never saw a reliable clock generator the size of a 0402 (or even 1208 now that I think about it) passive. Like I said I haven&#x27;t seen everything, if there are answers to these I&#x27;d love to see them.<p>2) He faked in some addition to unprogrammed memory, he theorizes the change can only work one way (change a high to low) so an obvious countermeasure is to fill empty memory with random bit patterns.<p>3) IIRC he intercepts an spi flash in series on the data (MISO) wire. Not only does this assume the spi clock is regular, I think it&#x27;s totally wrong because he says he turns high to low. Usually the quiescent state of a net like this is high, due to pullup on one or both sides to Vdd (high state.) The mark on the data wire is a short to ground against this pullup to get a low state. Now I haven&#x27;t seen everything, nor have I looked at any datasheets of parts used in any real system, of course the pullup can be anywhere along the wire, or in one or many integrated circuits along the net, but it really strikes me as incomplete because he says he turns high to low and I didn&#x27;t notice him mentioning anything about any pullup and how to deal with it.<p>So until I see something better than this talk I am writing this off as feeding the FUD.
评论 #18867022 未加载
评论 #18867504 未加载
评论 #18869052 未加载
评论 #18866910 未加载
mooseonsquirrel超过 6 年前
not all chip functions are documented or even acknoledged by the OEM. white paper doesnt document all the functions of the chip. look around at various whitepapers and you will see voids in the documentation, or referals so the user agreement and lisencing to access info and use of proprietary tech. If you are into low level programming and IDE design you will see mnemonic instructions laid out ina table with gaps in the address mapping and an explanation that they are reserved, or unavailable, same with expected bit inputs or outputs- reserved &quot;unmaped&quot; or &quot;unused&quot;
stcredzero超过 6 年前
BMCs are <i>&quot;typically unsecure with no protection, no detection and no recovery&quot;</i><p>What are the economic forces behind this, and would it be feasible to change this state of affairs?
walrus01超过 6 年前
Time to incorporate a supply chain verification&#x2F;hardware security firm named SETEC ASTRONOMY and see who gets the reference.
评论 #18865149 未加载
评论 #18865507 未加载