Single post
jump to replies> Our core observation is that any cheap but coarse HSM technology can be made much more difficult to attack by moving it very quickly.
fucking lmao tches.iacr.org/index.php/TCHES/article/download/9290/8856/7085
4 visible replies; 2 more replies hidden or not public
back to top@nyanotech "The Swivel Chair Attack" is such a great title
@nyanotech brb, replacing my HSM flywheel
@nyanotech interesting idea!
one thing that i didn't see (or missed while skimming the paper) is what they do when you remove power. you need a lot of power to keep rotating your HSM, so batteries are impractical. a conventional mesh can be easily monitored for weeks just from a battery inside the security envelope.
a power down will obviously be visible from the outside. but the attacker might provide some plausible explanation for a power outage while compromising the HSM. also initial deployment of the HSM might open a attack window while it is transported to the final datacenter in powered down state.
@electronic_eel iunno, i feel like if you make the spinny bits small enough, you could probably fit a large amount of runtime in like, a rackmount chassis