Beginners: please read this post and this post before posting to the forum.
0 Members and 1 Guest are viewing this topic.
[...] thought's? and how hard do you guys think something like this would be to breach?(please no comments about this being impossible i have many things I have done for proof of concept)
Android is one of the safest OS out there because of two reasons:1. The ARM processors, by design, use two levels of access: a root level, and an user level. Obviously, running a thread as user doesn't give you full access to everything.2. The Android platform itself uses that design feature, and all the apps that you run on it are run as user threads. That's why there are no viruses for Android. Each and every app runs in something similar to a sandbox.[...]P.S.: i'm not exactly an expert in the Android platform, nor regarding ARM processors. I just started reading up on them. So while my explanations above are somewhat true, I doubt they are 100% accurate.
Anything can be hacked, real hacking is about analyzing sequences and make order out of the seemingly random.
Start of loopEvery loop generate new code that can also generate code.Program the new code to the FPGA.Change the programming pins.GOTO start of loop
Personally, if you want to make something "unhackable" , open source the lot!I have never seen a piece of legitimate open source software/hardware "hacked" for malicious purposes
[...] You cannot hack something that is random![...] Nor can you hack something that doesn't provide output.
Rem that its is hard to hack even an "impenetrable fortress" like Winslowz.
You mean like Linux?Boy have I got news for you
The Best Anti-Theft, Anti-Hacker and Anti-Virus software is between your ears and under your scalp!
Secrecy is a bad idea so, you would publish details about the system, and believe that would do make it less hackable?
QuoteSecrecy is a bad idea so, you would publish details about the system, and believe that would do make it less hackable?Makes no sense.A piece of hardware, fully unique without any information available is *obviously* a good idea.
Do you think that ICBMS have operating systems?
If system is for Yourself only - yes, You can keep it a secret, the drawback is - system will die together with You. If everyone was thinking like You do, there would be no technology for us to use today.
You shouldn't put ICBMs to this discussion, as they are totally different matter. These are mass destruction weapons.
Believe me or not, these systems are well documented, however, these documents are available only to small number of people. Sooner or later - techniques behind ICBMs will become public knowledge. If You try to deny that - then have a read: Iran may have captured U.S. stealth drone by hacking its GPS.
Quote from: newInRobotics on January 12, 2012, 01:51:55 AMIf system is for Yourself only - yes, You can keep it a secret, the drawback is - system will die together with You. If everyone was thinking like You do, there would be no technology for us to use today.You have to pay attention to what the questioner asked: " how i could make a computer in theory very hard to hack/steel information from it. so what about making a computer with no frame of reference to any modern day system? "There is nothing whatsoever about this question that says "marketable" or "promoting technology for all" or any of the other assumptions you are making. It is a question SOLELY about how to make a computer that is very secure.
All you need to do to keep your weapons secure is to keep making NEW weapons with NEW operating systems that conform secrecy.
That's one way to do it, and a very expensive way I would say, as it requires thousands of man hours and resources. Don't You think that a much better plan is to build something rigid on it's own right and then improve upon it rather than create something from the scratch again and again, and again?
I don't know... don't you think that this would mean that we should never have invented PGP, and instead built upon... say, the enigma machine? Build on old compression technology instead of making new ones? Built on MSDOS and not invented linux?
In December 1932, the Polish Cipher Bureau first broke Germany's military Enigma ciphers. Five weeks before the outbreak of World War II, on 25 July 1939, in Warsaw, they presented their Enigma-decryption techniques and equipment to French and British military intelligence. Thanks to this, during the war, Allied codebreakers were able to decrypt a vast number of messages that had been enciphered using the Enigma. The intelligence gleaned from this source, codenamed "Ultra" by the British, was a substantial aid to the Allied war effort.
It is about creating security.