From: “geeman@best.com” <geeman@best.com>
To: “‘Christian Wettergren’” <cwe@it.kth.se>
Message Hash: 3a6fd6ac8f11f5afae6f85ad9f4f86aeb38d2fd68e85201bd7faa39475f5a194
Message ID: <01BB5DC1.392DE140@geeman.vip.best.com>
Reply To: N/A
UTC Datetime: 1996-06-19 23:57:05 UTC
Raw Date: Thu, 20 Jun 1996 07:57:05 +0800
From: "geeman@best.com" <geeman@best.com>
Date: Thu, 20 Jun 1996 07:57:05 +0800
To: "'Christian Wettergren'" <cwe@it.kth.se>
Subject: RE: Fuseable Links - no guarantees??
Message-ID: <01BB5DC1.392DE140@geeman.vip.best.com>
MIME-Version: 1.0
Content-Type: text/plain
----------
From: Christian Wettergren[SMTP:cwe@it.kth.se]
Sent: Tuesday, June 18, 1996 11:40 PM
To: Timothy C. May
Cc: cypherpunks@toad.com
Subject: Re: Fuseable Links - no guarantees??
So I guess one can look at the circuitry and apply non-standard voltage and
current values, or even non-standard timing values -- and do bad things
to these circuits. So this begs the question: Is there anyone who has looked
at "computer security" issues at this level?
>>> Of course, many have.
Return to June 1996
Return to ““geeman@best.com” <geeman@best.com>”