asciilifeform: the amt of ~actual~ reversing, to date, by zeptobar, is ~0.
asciilifeform: the problem with zeptobars, is that they're a ~porn co.
asciilifeform: however must point out, serious work does cost money; e.g. time on electron microscope, we saw what costs; and there is a population of folx who can make use of it, but can't steal enuff time on instruments, or , if they can, allocated it for something that actually pays the bills
asciilifeform: mircea_popescu: i don't expect that the google monkeys with access to the key, will willingly spill it ( tho this cannot be ruled out. ) idea was, possibly to get the same folks who currently sweat over ipnoje etc , interested.
asciilifeform: esp. if the derps begin to think that they've made an airtight trap.
asciilifeform: currently the thing is in a handful of boxes, but i suspect that it will spread.
asciilifeform: mircea_popescu: the code repo contains list of meat names of good candidates to tie to a post.
asciilifeform: at any rate, nothing's finalized, if mircea_popescu is convinced that this is dumb idea, i'ma call it off
asciilifeform: well i wrote the article. observe what sort of folx came thus far.
asciilifeform: mircea_popescu: occasionally folks do break things. presently they're stuck 1) publishing, and it gets patched within a day by enemy 2) the enemy's bounties, paid in printolade
asciilifeform: cnomad: it is quite conceivable that the artifact is airtight, and no one will collect the prize. however it is also conceivable that there is, e.g., buffer overflow somewhere in the mass of c crapola, and it can be rooted today, via the usb jack.
asciilifeform: and at any rate a pill that requires elaborate physical diddling is not suitable for mass curing.
asciilifeform: cnomad: chip appears to be rad-hard, to an extent, also. tho there is a plain physical limit as to rad-hardness of an object half a mm in thickness
asciilifeform: ( i can dpa right here, dun need help even. but it isn't particularly useful for cr50. )
asciilifeform: cnomad: dpa won't do a lick of good, the boobytrap is a rsa pub sig check, no secrets involved
asciilifeform: re 'weeks of nonstop work', understand that the break must be mass-applicable, it is not useful to flip the bits with electron beam in ~one~ particular cr50
asciilifeform: but until then, it is a kind of iphone
asciilifeform: then, e.g. the c101pa, becomes a pretty useful, general-purpose arm64 box.
asciilifeform: the objective is to neuter, once and for all, the nsa master key mechanism.
asciilifeform: so it is just as good to break the 'rma lock' mechanism, as the firmware verification, as i currently understand it.
asciilifeform: simply must point out, if as side effect of the break, the user-loaded data is nulled, this is not a problem for us.
asciilifeform: ( how am i to know whom to pay ? and if the magic answer is sent plaintext, it will land in the fleanode nsa trap and immediately get shared with the enemy. )
asciilifeform: so, for example, i am considering declaring a btc bounty for cr50 break. but it will only be available to folks in the wot, for the very obvious reason .
asciilifeform: nor will anyone attempt to communicate in confidence with you, without gpg pubkey.
asciilifeform: until you are in the wot, 'you' do not exist, it is not difficult to hijack a fleanode nick.