14.9.1. The more modern name for what used to be called "tamper-proof
boxes"
14.9.2. Uses:
- alarmed display cases, pressure-sensitive, etc. (jewels,
art, etc.)
+ chips with extra layers, fuses, abrasive comounds in the
packaging
- to slow down grinding, etching, other depotting or
decapping methods
- VLSI Technology Inc. reportedly uses these methods in its
implementation of the MYK-78 "Clipper" (EES) chip
- nuclear weapons ("Permissive Action Links," a la Sandia,
Simmons)
- smartcards that give evidence of tampering, or that become
inactive
+ as an example, disk drives that erase data when plug is
pulled, unless proper code is first entered
- whew! pretty risky (power failures and all), but needed
by some
- like "digital flash paper"
14.9.3. Bypassing tamper-responding or tamper-resistant technologies
- first, you have to _know_
Next Page: 14.10 Whistleblowing
Previous Page: 14.8 Hiding cyphertext
By Tim May, see README
HTML by Jonathan Rochkind