Recent article about using Apple II for security purposes
Clash Royale CLAN TAG#URR8PPP
up vote
2
down vote
favorite
I'm looking for the article for a project. It is fairly recent, may have been a news article, or a blog. It in turn might have referenced a scholarly paper.
Anyway, the gist of the article was that because modern computers are so complex, it is very easy to introduce insecure hardware into a process. There was apparently an incident because some laptops brought to an inspection site (maybe NATO or UN) were being used to eavesdrop and funnel logged data to a hostile 3rd party.
The argument was to use Apple II or some other older technologies instead because it is much simpler and more easy to verify if correct.
If this rings a bell with anyone, would really appreciate getting the link to it.
hardware apple-ii
New contributor
add a comment |Â
up vote
2
down vote
favorite
I'm looking for the article for a project. It is fairly recent, may have been a news article, or a blog. It in turn might have referenced a scholarly paper.
Anyway, the gist of the article was that because modern computers are so complex, it is very easy to introduce insecure hardware into a process. There was apparently an incident because some laptops brought to an inspection site (maybe NATO or UN) were being used to eavesdrop and funnel logged data to a hostile 3rd party.
The argument was to use Apple II or some other older technologies instead because it is much simpler and more easy to verify if correct.
If this rings a bell with anyone, would really appreciate getting the link to it.
hardware apple-ii
New contributor
2
Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
â tofro
3 hours ago
I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
â user3528438
2 hours ago
1
@tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
â Chenmunkaâ¦
2 hours ago
add a comment |Â
up vote
2
down vote
favorite
up vote
2
down vote
favorite
I'm looking for the article for a project. It is fairly recent, may have been a news article, or a blog. It in turn might have referenced a scholarly paper.
Anyway, the gist of the article was that because modern computers are so complex, it is very easy to introduce insecure hardware into a process. There was apparently an incident because some laptops brought to an inspection site (maybe NATO or UN) were being used to eavesdrop and funnel logged data to a hostile 3rd party.
The argument was to use Apple II or some other older technologies instead because it is much simpler and more easy to verify if correct.
If this rings a bell with anyone, would really appreciate getting the link to it.
hardware apple-ii
New contributor
I'm looking for the article for a project. It is fairly recent, may have been a news article, or a blog. It in turn might have referenced a scholarly paper.
Anyway, the gist of the article was that because modern computers are so complex, it is very easy to introduce insecure hardware into a process. There was apparently an incident because some laptops brought to an inspection site (maybe NATO or UN) were being used to eavesdrop and funnel logged data to a hostile 3rd party.
The argument was to use Apple II or some other older technologies instead because it is much simpler and more easy to verify if correct.
If this rings a bell with anyone, would really appreciate getting the link to it.
hardware apple-ii
hardware apple-ii
New contributor
New contributor
edited 2 hours ago
Michael Shopsin
748321
748321
New contributor
asked 4 hours ago
Yimin Rong
1136
1136
New contributor
New contributor
2
Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
â tofro
3 hours ago
I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
â user3528438
2 hours ago
1
@tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
â Chenmunkaâ¦
2 hours ago
add a comment |Â
2
Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
â tofro
3 hours ago
I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
â user3528438
2 hours ago
1
@tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
â Chenmunkaâ¦
2 hours ago
2
2
Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
â tofro
3 hours ago
Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
â tofro
3 hours ago
I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
â user3528438
2 hours ago
I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
â user3528438
2 hours ago
1
1
@tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
â Chenmunkaâ¦
2 hours ago
@tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
â Chenmunkaâ¦
2 hours ago
add a comment |Â
1 Answer
1
active
oldest
votes
up vote
4
down vote
accepted
Juice.GS in volume 23 issue 2 had an article "Vintage Verification":
Researchers at Princeton University present the Information Barrier
eXperimental II, or IBX II, used to obtain trusted gamma radiation
measurements of nuclear weapons.
The article covers why an Apple II can be used to detect fissionable materials, and how the simplicity of vintage hardware along with the improbability of backdoors makes them a good choice.
1
Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
â Yimin Rong
2 hours ago
add a comment |Â
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
4
down vote
accepted
Juice.GS in volume 23 issue 2 had an article "Vintage Verification":
Researchers at Princeton University present the Information Barrier
eXperimental II, or IBX II, used to obtain trusted gamma radiation
measurements of nuclear weapons.
The article covers why an Apple II can be used to detect fissionable materials, and how the simplicity of vintage hardware along with the improbability of backdoors makes them a good choice.
1
Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
â Yimin Rong
2 hours ago
add a comment |Â
up vote
4
down vote
accepted
Juice.GS in volume 23 issue 2 had an article "Vintage Verification":
Researchers at Princeton University present the Information Barrier
eXperimental II, or IBX II, used to obtain trusted gamma radiation
measurements of nuclear weapons.
The article covers why an Apple II can be used to detect fissionable materials, and how the simplicity of vintage hardware along with the improbability of backdoors makes them a good choice.
1
Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
â Yimin Rong
2 hours ago
add a comment |Â
up vote
4
down vote
accepted
up vote
4
down vote
accepted
Juice.GS in volume 23 issue 2 had an article "Vintage Verification":
Researchers at Princeton University present the Information Barrier
eXperimental II, or IBX II, used to obtain trusted gamma radiation
measurements of nuclear weapons.
The article covers why an Apple II can be used to detect fissionable materials, and how the simplicity of vintage hardware along with the improbability of backdoors makes them a good choice.
Juice.GS in volume 23 issue 2 had an article "Vintage Verification":
Researchers at Princeton University present the Information Barrier
eXperimental II, or IBX II, used to obtain trusted gamma radiation
measurements of nuclear weapons.
The article covers why an Apple II can be used to detect fissionable materials, and how the simplicity of vintage hardware along with the improbability of backdoors makes them a good choice.
answered 2 hours ago
Michael Shopsin
748321
748321
1
Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
â Yimin Rong
2 hours ago
add a comment |Â
1
Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
â Yimin Rong
2 hours ago
1
1
Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
â Yimin Rong
2 hours ago
Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
â Yimin Rong
2 hours ago
add a comment |Â
Yimin Rong is a new contributor. Be nice, and check out our Code of Conduct.
Yimin Rong is a new contributor. Be nice, and check out our Code of Conduct.
Yimin Rong is a new contributor. Be nice, and check out our Code of Conduct.
Yimin Rong is a new contributor. Be nice, and check out our Code of Conduct.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fretrocomputing.stackexchange.com%2fquestions%2f7581%2frecent-article-about-using-apple-ii-for-security-purposes%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
2
Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
â tofro
3 hours ago
I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
â user3528438
2 hours ago
1
@tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
â Chenmunkaâ¦
2 hours ago