On Mon, Oct 20, 2014 at 12:09:32 CEST, Sven Eschenberg wrote: > On Mon, October 20, 2014 00:10, Arno Wagner wrote: > > On Sun, Oct 19, 2014 at 22:59:21 CEST, Cpp wrote: > >> On 10/19/14, Arno Wagner <arno@xxxxxxxxxxx> wrote: > >> > Actually, it has a pretty good chance of working well. Once. > >> > And if it is not too obvious and nowhere documented that the > >> > attacker can get at beforehand. > >> > >> So basically if a device like this is meant to be used and distributed > >> widely, one security requirement would be that each and every device > >> uses a custom anti-tampering circuitry setup so that no two setups are > >> identical. After one device has been compromised, a new custom setup > >> has to be made, possibly at a new location. > > > > For DIY, yes. Commercial HSMs have another protection, namely > > they are priced at EUR 50k+. That discourages most attackers from > > buying a few to leant how to break into them. > > > > Would an attacker really spent 50k+ or would he/she spend 10% of that to > break into the company building the HSM? Or even less pricier, break > 'into' one or more employees? I think you have no idea what professional, traceless B&E costs for companies secured like this, if it is possible at all. And then all you would be able to steal is some encrypted data. And the Employee? You first need to find one that has the required knowledge and that you can make sure will not talk to his employer. Sorry, but that does not sound like a valid approach at all. Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@xxxxxxxxxxx GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718 ---- A good decision is based on knowledge and not on numbers. -- Plato If it's in the news, don't worry about it. The very definition of "news" is "something that hardly ever happens." -- Bruce Schneier _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt