[Cryptech Tech] arm

Peter Gutmann pgut001 at cs.auckland.ac.nz
Tue Jan 20 08:10:08 UTC 2015


Jakob Schlyter <jakob at kirei.se> writes:

>Would you consider that bridge to be inside or outside the security boundary
>of the HSM?

That depends on what you call the "security boundary" (and what you're trying
to do by asking that question).  I would consider it as a firewall, it's
taking a not-necessarily-trustworthy component and isolating it to reduce the
amount of access it has to HSM critical components.

Peter.



More information about the Tech mailing list