Recent article about using Apple II for security purposes

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
2
down vote

favorite












I'm looking for the article for a project. It is fairly recent, may have been a news article, or a blog. It in turn might have referenced a scholarly paper.



Anyway, the gist of the article was that because modern computers are so complex, it is very easy to introduce insecure hardware into a process. There was apparently an incident because some laptops brought to an inspection site (maybe NATO or UN) were being used to eavesdrop and funnel logged data to a hostile 3rd party.



The argument was to use Apple II or some other older technologies instead because it is much simpler and more easy to verify if correct.



If this rings a bell with anyone, would really appreciate getting the link to it.










share|improve this question









New contributor




Yimin Rong is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.















  • 2




    Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
    – tofro
    3 hours ago











  • I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
    – user3528438
    2 hours ago






  • 1




    @tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
    – Chenmunka♦
    2 hours ago














up vote
2
down vote

favorite












I'm looking for the article for a project. It is fairly recent, may have been a news article, or a blog. It in turn might have referenced a scholarly paper.



Anyway, the gist of the article was that because modern computers are so complex, it is very easy to introduce insecure hardware into a process. There was apparently an incident because some laptops brought to an inspection site (maybe NATO or UN) were being used to eavesdrop and funnel logged data to a hostile 3rd party.



The argument was to use Apple II or some other older technologies instead because it is much simpler and more easy to verify if correct.



If this rings a bell with anyone, would really appreciate getting the link to it.










share|improve this question









New contributor




Yimin Rong is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.















  • 2




    Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
    – tofro
    3 hours ago











  • I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
    – user3528438
    2 hours ago






  • 1




    @tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
    – Chenmunka♦
    2 hours ago












up vote
2
down vote

favorite









up vote
2
down vote

favorite











I'm looking for the article for a project. It is fairly recent, may have been a news article, or a blog. It in turn might have referenced a scholarly paper.



Anyway, the gist of the article was that because modern computers are so complex, it is very easy to introduce insecure hardware into a process. There was apparently an incident because some laptops brought to an inspection site (maybe NATO or UN) were being used to eavesdrop and funnel logged data to a hostile 3rd party.



The argument was to use Apple II or some other older technologies instead because it is much simpler and more easy to verify if correct.



If this rings a bell with anyone, would really appreciate getting the link to it.










share|improve this question









New contributor




Yimin Rong is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











I'm looking for the article for a project. It is fairly recent, may have been a news article, or a blog. It in turn might have referenced a scholarly paper.



Anyway, the gist of the article was that because modern computers are so complex, it is very easy to introduce insecure hardware into a process. There was apparently an incident because some laptops brought to an inspection site (maybe NATO or UN) were being used to eavesdrop and funnel logged data to a hostile 3rd party.



The argument was to use Apple II or some other older technologies instead because it is much simpler and more easy to verify if correct.



If this rings a bell with anyone, would really appreciate getting the link to it.







hardware apple-ii






share|improve this question









New contributor




Yimin Rong is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











share|improve this question









New contributor




Yimin Rong is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this question




share|improve this question








edited 2 hours ago









Michael Shopsin

748321




748321






New contributor




Yimin Rong is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked 4 hours ago









Yimin Rong

1136




1136




New contributor




Yimin Rong is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





Yimin Rong is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






Yimin Rong is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.







  • 2




    Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
    – tofro
    3 hours ago











  • I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
    – user3528438
    2 hours ago






  • 1




    @tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
    – Chenmunka♦
    2 hours ago












  • 2




    Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
    – tofro
    3 hours ago











  • I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
    – user3528438
    2 hours ago






  • 1




    @tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
    – Chenmunka♦
    2 hours ago







2




2




Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
– tofro
3 hours ago





Considering the Apple II was the first computer where in 1980 reportedly a virus was detected, this is maybe not the best possible idea... (apple2history.org/history/ah23)
– tofro
3 hours ago













I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
– user3528438
2 hours ago




I wonder if it's actually secured, even if it might be easier to verify. But most often, as long as you don't connect it to the internet, any computer is secured.
– user3528438
2 hours ago




1




1




@tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
– Chenmunka♦
2 hours ago




@tofro: Viruses were around long before 1980 and well before the Apple II came out. I wouldn't trust that report.
– Chenmunka♦
2 hours ago










1 Answer
1






active

oldest

votes

















up vote
4
down vote



accepted










Juice.GS in volume 23 issue 2 had an article "Vintage Verification":




Researchers at Princeton University present the Information Barrier
eXperimental II, or IBX II, used to obtain trusted gamma radiation
measurements of nuclear weapons.




The article covers why an Apple II can be used to detect fissionable materials, and how the simplicity of vintage hardware along with the improbability of backdoors makes them a good choice.






share|improve this answer
















  • 1




    Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
    – Yimin Rong
    2 hours ago










Your Answer







StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "648"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
convertImagesToLinks: false,
noModals: false,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);






Yimin Rong is a new contributor. Be nice, and check out our Code of Conduct.









 

draft saved


draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fretrocomputing.stackexchange.com%2fquestions%2f7581%2frecent-article-about-using-apple-ii-for-security-purposes%23new-answer', 'question_page');

);

Post as a guest






























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes








up vote
4
down vote



accepted










Juice.GS in volume 23 issue 2 had an article "Vintage Verification":




Researchers at Princeton University present the Information Barrier
eXperimental II, or IBX II, used to obtain trusted gamma radiation
measurements of nuclear weapons.




The article covers why an Apple II can be used to detect fissionable materials, and how the simplicity of vintage hardware along with the improbability of backdoors makes them a good choice.






share|improve this answer
















  • 1




    Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
    – Yimin Rong
    2 hours ago














up vote
4
down vote



accepted










Juice.GS in volume 23 issue 2 had an article "Vintage Verification":




Researchers at Princeton University present the Information Barrier
eXperimental II, or IBX II, used to obtain trusted gamma radiation
measurements of nuclear weapons.




The article covers why an Apple II can be used to detect fissionable materials, and how the simplicity of vintage hardware along with the improbability of backdoors makes them a good choice.






share|improve this answer
















  • 1




    Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
    – Yimin Rong
    2 hours ago












up vote
4
down vote



accepted







up vote
4
down vote



accepted






Juice.GS in volume 23 issue 2 had an article "Vintage Verification":




Researchers at Princeton University present the Information Barrier
eXperimental II, or IBX II, used to obtain trusted gamma radiation
measurements of nuclear weapons.




The article covers why an Apple II can be used to detect fissionable materials, and how the simplicity of vintage hardware along with the improbability of backdoors makes them a good choice.






share|improve this answer












Juice.GS in volume 23 issue 2 had an article "Vintage Verification":




Researchers at Princeton University present the Information Barrier
eXperimental II, or IBX II, used to obtain trusted gamma radiation
measurements of nuclear weapons.




The article covers why an Apple II can be used to detect fissionable materials, and how the simplicity of vintage hardware along with the improbability of backdoors makes them a good choice.







share|improve this answer












share|improve this answer



share|improve this answer










answered 2 hours ago









Michael Shopsin

748321




748321







  • 1




    Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
    – Yimin Rong
    2 hours ago












  • 1




    Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
    – Yimin Rong
    2 hours ago







1




1




Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
– Yimin Rong
2 hours ago




Perfect that's it. I'm glad to see I remembered some of the details correctly! That page provided enough details to find nuclearfutures.princeton.edu/vintageverification
– Yimin Rong
2 hours ago










Yimin Rong is a new contributor. Be nice, and check out our Code of Conduct.









 

draft saved


draft discarded


















Yimin Rong is a new contributor. Be nice, and check out our Code of Conduct.












Yimin Rong is a new contributor. Be nice, and check out our Code of Conduct.











Yimin Rong is a new contributor. Be nice, and check out our Code of Conduct.













 


draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fretrocomputing.stackexchange.com%2fquestions%2f7581%2frecent-article-about-using-apple-ii-for-security-purposes%23new-answer', 'question_page');

);

Post as a guest













































































Comments

Popular posts from this blog

Long meetings (6-7 hours a day): Being “babysat” by supervisor

Is the Concept of Multiple Fantasy Races Scientifically Flawed? [closed]

Confectionery