On Sun, Sep 07, 2008 at 07:10:35PM -0400, Gregory Maxwell wrote: > Real ones consider these issues, and demand manufacturers comply > with various security standards which validate the security of the > hardware/firmware. Hmmm. Apparently even the US DoD has concerns about electronic trapdoors being placed in hardware: http://www.spectrum.ieee.org/may08/6171 BTW, validating software is really hard. Validating hardware is even harder, and verifying that the chip fitted in your fighter jet matches the designs for the chip and doesn't have some 'extra' circuitry hidden away is prohibitively hard (see that article). Rich. -- Richard Jones, Emerging Technologies, Red Hat http://et.redhat.com/~rjones virt-p2v converts physical machines to virtual machines. Boot with a live CD or over the network (PXE) and turn machines into Xen guests. http://et.redhat.com/~rjones/virt-p2v -- fedora-devel-list mailing list fedora-devel-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-devel-list