kzt wrote:That actually won't work, because the interesting stuff is on drive & core b. So once you suborn Flash or whatever minor utility on core b you have access to the actual data of interest.
And depending on how sophisticated and patient the attacker is there are ways to corrupt even secure firmware.
Ever read Ken Thompson's "Reflections on Trusting Trust"?
This is why I decided not to continue the discussion. Remember the "two thousand years" mantra? Discussing why our current designs can't manage it assumes that we're the smartest apes on the block and nobody who comes after us will have any of those "unpredictable" insights that makes an unresolvable problem easy.
I could list a huge number of problems with our current system. So could anyone with a decent computer security background, and that would be a much longer list. Most of them are solvable with the political will to say things like "C requires super-human programmers if you want a secure program at an affordable price; we need a low level language that doesn't require programmers to not make any mistakes, anywhere, at any time," and then back it up with action. Or say "a currently secure pass-phrase needs to be at least 5 words and 30 characters, so any program that doesn't accept pass-phrases of at least 45 characters is violating standards. You won't like the fines you'll get for either selling or using one."
It's easy to think that the problems are unresolvable. In fact, that seems to be a common belief, and that belief, in turn, has some of the characteristics of a self-fulfilling prophecy.
David is telling an interesting story. This is a side issue.