(no title)
zakary | 1 year ago
For defence product where almost everything is fully specified by the customer, it might be possible. If you know all the components in a device, and you can prove they are all genuine, then you can prove the whole device is genuine.
Engraved hashes on every part comes to mind, but that would be ungainly to validate and fairly easy to bypass by simply copying codes from one device to another.
acdha|1 year ago
This isn’t even very effective for software: people have been working on commit signing, reproducible builds, etc. for ages but it’s just a cascade of trust problems where striking the balance between workable and effective can be extremely challenging. Something like xz or SolarWinds would have had valid signatures on everything, and you still wouldn’t know the real identity of the person responsible for the duplicitous code.
toomuchtodo|1 year ago