cthia wrote:kzt wrote:Exactly what does that have to do with the price of eggs?
You suggest exactly what approach to reprogram a ROM over a unidirectional serial interface?
That's exactly what was accomplished long ago when the eggs were the tape drives of a TRS-80 and users needed to utilize a more capable third party BIOS. The native ROM was decoded and supplanted by the user. This was accomplished by dumping ROM for analysis then intercepting the interrupt vector that reported to ROM.
It happened again with the Heathkits, iirc, although they were intentionally designed to do so, as an easy way (for the company only) to upgrade BIOS. Except that the little secret got out.
My attempt was to point out that a completely secure system is at the mercy of the designers and the users --regardless of how many tons of steel or water in which it is encased.
I know that was in the dinosaur days of computing, but idiocy in design isn't an age, it's a state of mind.
Joat42 wrote:PAL != ROM
Of course it doesn't. I think that analogy went right over your head. No time for a dissertation. This'll have to suffice. "
Any type of programming can be
supplanted. Given intimate knowledge of the system, physical access, location and/or many other factors. Intimate knowledge of the system itself is compromising. Of course, in Hitler's day, he'd've had the designers shot after it was completed, making a bigger mistake.
And you can't compare a programmable computer to a hardwired system. Sure, there are ways to compromise a hardwired system but it's difficult and you almost always need physical access. And if you have physical access it's already compromised.
Exactly! Now you're catching up. The designers and users already do have this access. We compromise the designers and the users. It is essentially what the army of virus engineers do all the time. The difference between a hacker and a Harkness is conception of problem and intimacy of knowledge.
I'm not comparing the two. I'm huddling them both under the umbrella of being privy to the faults and bugs of the designers, users, human elements and lack of conception.
Most OTP IC's for secure applications today are programmed at the factory, the circuit themselves doesn't even contain the circuitry for the programming. Some OTP IC's can't even be reprogrammed since the programming physically alters the circuit. They also contain anti-tampering circuitry which bricks the IC if tampering are detected.

That level of security was once circumvented in-house, because a systems designer wanted a back door into the process to facilitate... design. That hole was failed to be plugged before production time. The human element strikes... yet... again.
To compromise that type of circuitry you need acid to dissolve the packaging (hoping it doesn't damage the chip) and some very very expensive equipment to probe the naked IC. There are some other esoteric methods to compromise chips also by among other things faking signals into them and cooling.
Many methods limited only by imagination and opportunity availed.
But perhaps. And perhaps more so if a hacker was always looking towards the brute force solution. Of course, some other ingenious and quite resourceful hacker (*who also may somehow have intimate or privileged knowledge) may take advantage of the quantum computer speeds (virtually a Harkness minicomp compared to anything it would be up against) that just hit the market.
A significant order of magnitude of machine cycles of an advancement in tech invalidates any security system. Automagically. Just get me to a port (in Harkness' case) or something.