1996-06-19 - RE: Fuseable Links - no guarantees??

Header Data

From: “geeman@best.com” <geeman@best.com>
To: “‘Christian Wettergren’” <cwe@it.kth.se>
Message Hash: 3a6fd6ac8f11f5afae6f85ad9f4f86aeb38d2fd68e85201bd7faa39475f5a194
Message ID: <01BB5DC1.392DE140@geeman.vip.best.com>
Reply To: N/A
UTC Datetime: 1996-06-19 23:57:05 UTC
Raw Date: Thu, 20 Jun 1996 07:57:05 +0800

Raw message

From: "geeman@best.com" <geeman@best.com>
Date: Thu, 20 Jun 1996 07:57:05 +0800
To: "'Christian Wettergren'" <cwe@it.kth.se>
Subject: RE: Fuseable Links - no guarantees??
Message-ID: <01BB5DC1.392DE140@geeman.vip.best.com>
MIME-Version: 1.0
Content-Type: text/plain




----------
From: 	Christian Wettergren[SMTP:cwe@it.kth.se]
Sent: 	Tuesday, June 18, 1996 11:40 PM
To: 	Timothy C. May
Cc: 	cypherpunks@toad.com
Subject: 	Re: Fuseable Links - no guarantees?? 


So I guess one can look at the circuitry and apply non-standard voltage and
current values, or even non-standard timing values -- and do bad things
to these circuits. So this begs the question: Is there anyone who has looked
at "computer security" issues at this level? 

>>> Of course, many have.






Thread