Changes To Experiment: mmmv_symsig_t1
Not logged in

Changes to "Experiment: mmmv_symsig_t1" between 2017-10-10 00:16:59 and 2017-10-10 00:28:04

    91     91   be "salted" by using temporary keys from previous onionencrypted sessions and
    92     92   by choosing the KXSs  randomly for every onionencrypted session. The more
    93     93   KXSs there are, the greater the number of different operating systems and
    94     94   hardware the set of KXSs uses. The greater the variety of operating systems and
    95     95   hardware that the KXSs use, the more elaborate must be the software that is
    96     96   needed for breaking into KXSs systems. Some extra variety within the KXSs can
    97     97   be introduced relatively cheaply by using <a href="https://archive.li/vQLZk">FPGA
    98         -based embedded boards</a>.</div>
           98  +based embedded boards</a>.&nbsp;</div>
           99  +
          100  +<div><br>
          101  +</div>
          102  +
          103  +<div>For really high security setups the KXSs core functionality might be
          104  +implemented literally as a microcontroller board that does all the encryption
          105  +and decryption and stores all of the keys at an USB flash drive that is
          106  +directly connected to the microcontroller board. The microcontroller board can
          107  +be connected to the internet through GPIO of some Raspberry Pi like computer,
          108  +which acts as a "network card with all internet communication related software
          109  +included". Since the microcontroller software is remarkably primitive, then
          110  +there's practically no attack surface there and the best that any remote
          111  +adversary can do is to break into the Raspberry Pi, but the Raspberry Pi acts
          112  +only as a fancy network card and resides outside of the secure zone. Different
          113  +KXSs can use different encryption algorithms for communicating with the Alice
          114  +and the Bob. That allows the use of encryption algorithms that are usable on
          115  +the microcontroller board.</div>
          116  +
          117  +<div><br>
          118  +</div>
    99    119   
   100    120   <div><br>
   101    121   </div>
   102    122   
   103    123   <div><br>
   104    124   </div>
   105    125   
   106    126   <div><br>
   107    127   </div>
   108    128   
   109    129   <div><br>
   110    130   </div>