this guy is working on Anelok, a little passwords/keys/etc storage that
has a little screen and few buttons:
http://downloads.qi-hardware.com/people/werner/anelok/tmp/mk3-running/on-accounts.jpg
mailing list for history of his work on it:
Photos:
http://lists.en.qi-hardware.com/pipermail/discuss
---
crowd-funded eco-conscious hardware: https://www.crowdsupply.com/eoma68
On Thu, Sep 21, 2017 at 5:50 PM, Alexander Ross
wrote:
> heres there article about smartcards and nitrokey
> https://www.devever.net/~hl/smartcards
>
> thoughts? :/
pretty interesting. says it all...
heres there article about smartcards and nitrokey
https://www.devever.net/~hl/smartcards
thoughts? :/
___
arm-netbook mailing list arm-netbook@lists.phcomp.co.uk
http://lists.phcomp.co.uk/mailman/listinfo/arm-netbook
Send large attachments to arm-netb..
https://www.crowdsupply.com/third-pin/pastilda
same sort of thing. basically they use an STM32F4 (both of them).
btw when you next speak to them, mention libopencm3 and the fact that
i use the STM32F072... there is *absolutely no need* for proprietary
firmware-flashing tools with the STM32F range
talking of crypto usb sticks, theres a new one crowdfunding:
https://www.crowdsupply.com/nth-dimension/signet
the dev has been helpful/responsive to my questions too.
the bootloader thing is non-free but that is only used in the factory
and for updates it uses its own upgrade software in the firm
On 09/21/2017 01:10 AM, Luke Kenneth Casson Leighton wrote:
...snip...
> baiscally what i'm saying, with this story is: the tricky part will
> not be the software at all: the tricky bit will be getting a processor
> into a tamper-resistant, tamper-detecting box.
>
I can't vouch for them, but IST
On Thu, Sep 21, 2017 at 11:16 AM, Philip Hands wrote:
> Most of the time, what you're calling hardware is liable to just be
> software running on a different processor, perhaps in a box that has
> been glued shut such that it's less convenient for bugs to be found,
> fixed and patched.
glued sh
zap writes:
...
> also, hardware encryption is far stronger than software encryption.
Faster (potentially), maybe less open to side-channel attacks (if
properly designed), but I see no reason that the same algorithm
implemented in silicon would be any "stronger" than if it were in
software.
Mos