this post was submitted on 21 May 2024
495 points (98.2% liked)

Technology

70285 readers
3288 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 81 points 1 year ago (3 children)

The flip side of this is that hackers can brick the same machines.....

[–] [email protected] 55 points 1 year ago (6 children)

Depends how its set up. So long as it's fully independent and disconnected from existing digital infrastructure it should be safer. It could be as simple as explosives hard-wired with a buried line running up into some bunker up in the mountains.

[–] [email protected] 44 points 1 year ago (2 children)

By remotely I don't think they meant a long RJ45 cable connected to nothing.

So this doesn't look like a setup that can be fully secure.

Could even be completely fake and just to dissuade China from invading.

[–] [email protected] 14 points 1 year ago

That would be clever.

[–] [email protected] 1 points 1 year ago

A guy with an RC car remote, peering across the Taiwan Strait with benoculars

[–] [email protected] 13 points 1 year ago (1 children)

Stuxnet would like to have a word

[–] [email protected] 15 points 1 year ago (1 children)

Note, I said safer, not completely safe. Even a hard line to a bunker simply needs someone to locate the line and activate it.

Completely safe does not and likely never will exist, as the history of human arms evolution should demonstrate.

[–] [email protected] 3 points 1 year ago

Assuming it wasn't shielded and knew you where near by couldn't you just broadcast the code or what ever with enough power to cause the same effect?

[–] [email protected] 6 points 1 year ago

That's what you have to do of you don't want the invaders to get the tech. If you brick the processors they still have the machines. I'm not sure what the secret sauce is in this case, but china has a reputation of reverse engineering things in spite of foreign laws. The best way to keep it from happening is to make sure they get no part of it.

[–] [email protected] 5 points 1 year ago* (last edited 1 year ago)

So long as it’s fully independent and disconnected from existing digital infrastructure it should be safer.

It's a puzzle, because anything with too many safety features can be easily disarmed. But anything with too few can be prematurely detonated.

Imagine what happens to the Taiwanese economy if there's a Chinese feint or false alarm and the facility bricks itself. A massive economic downturn would not work to the benefit of an island so heavily reliant on foreign trade.

[–] [email protected] 1 points 1 year ago (1 children)

disconnected from existing digital infrastructure

Oh come on.... this isn't just a scrap metal press.

[–] [email protected] 4 points 1 year ago

Sure. But a kill switch might warrant some additional investment. It's not like your other features.

Assuming the kill switch is a real kill switch, and not just casually shutting things down in a way where they can easily be turned back on.

[–] [email protected] 11 points 1 year ago

Geopolitics aside, the technical architecture implementation of this mechanism is really interesting for me. I think over all, having extra ability to disable these systems would prevent US launching attacks against the plants — which could cause spill over local civilian injuries — but there’s just so many more things to consider.

Is it a dead-man switch style of setup, where if it doesn’t get authorization from HQ after some time, it will stop working? Or is it a kill switch style of setup, where they can remotely issue a command to stop operation? Because different vectors then come up depending on the securing method. For example: Dead-man switch might be tricked/overcame by turning back the clock, whereas kill switch might be circumvented by severing the network connection before the command could be issued (literally cut the underwater cables before they start the invasion).

How is the mechanism itself secured? If it is certificate based like everything else, then we’d have to worry about the certificate signing authority getting pressured into signing certificates by state backed actors.

Would really love to learn about the setup one day after all these is over, to learn about the thinkings that’s been done on such an important piece of … “infrastructure”?

[–] [email protected] 5 points 1 year ago

They'd have everything to lose. Everyone wants those machines. Disabling or destroying those machines is like slashing the only nice life raft on the open ocean. Sure, there are others, but they have cracked rubber and don't seem as firm. Bleeding edge fabs are the oil of the 21st century.