What a massive joke for something that can be implemented with a secondary LAN-only server.
[editline]28th January 2016[/editline]
Its disgusting how much they're charging for this hardware thats probably no more secure than using a secondary server especially because I doubt its internal storage is encrypted.
[QUOTE=Map in a box;49628570]What a massive joke for something that can be implemented with a secondary LAN-only server.
[editline]28th January 2016[/editline]
Its disgusting how much they're charging for this hardware thats probably no more secure than using a secondary server especially because I doubt its internal storage is encrypted.[/QUOTE]
You have no idea how much enterprise hardware out there is really rebadged and overpriced crap.
[QUOTE=pentium;49628599]You have no idea how much enterprise hardware out there is really rebadged and overpriced crap.[/QUOTE]
I would have never thought I would have seen a collective pay more for hardware than defense contracts. truly amazing.
[QUOTE=Map in a box;49628570]What a massive joke for something that can be implemented with a secondary LAN-only server.
[editline]28th January 2016[/editline]
Its disgusting how much they're charging for this hardware thats probably no more secure than using a secondary server especially because I doubt its internal storage is encrypted.[/QUOTE]
the difference is it doesn't actually run an OS, it's a custom-built microcontroller with no way to force access into it.
[QUOTE=geel9;49628913]the difference is it doesn't actually run an OS, it's a custom-built microcontroller with no way to force access into it.[/QUOTE]
no known way to get access to it and there's nothing stopping you from preventing external access to the authentication server without requiring physical access.
[editline]28th January 2016[/editline]
and it does run an OS, its just an RTOS.
[QUOTE=geel9;49628913]the difference is it doesn't actually run an OS, it's a custom-built microcontroller with no way to force access into it.[/QUOTE]
Unless they're paying insane amounts to have their own dies made they'll be using an FPGA or similar in there somewhere with stuff like the readback security fuses opened or the microcode in mask ROM.
This is also assuming the Chinese factory that will ultimately manufacture the boards, program the chips and assemble it all doesn't shim a backdoor in right then and there and we don't find out about it until later on when it's seen several major deployments and at least one mysterious leak. I don't know how we keep designing security hardware in-house but outsource the assembly to factories in a country which is one of the biggest sources of espionage in the world.
We don't even know if the hardware used will have any 'security' features.
[editline]28th January 2016[/editline]
You could also for example with a dedicated server have a LUKS nuke the HDD if the case is opened
Sorry, you need to Log In to post a reply to this thread.