Saturday, February 24, 2018

Trusting the microprocessor

The iron hard processor has the hidden key, and can send the micro code signature back to the foundry, there a caged processor can check it against the list. The harden processors in the escrow router are not the bottleneck, there i no queuing and they run short, spanning tree protocols. Most of the routing will use only hundreds of instructions, everything else is passed on to untrusting notaries and pit, an they have the queues.  So the number of hardened processors we need to get aoud the oits is small, thousands. Intel can charge quadruple the price, make it worth it. The smaller the number outtaning, the fewer security guards.

More than likely demand for secure processor  is total.   That is still ok because notaries can band  together and only support those processors they know.  Even without secret keys, notaries can band together and insure some out of band security services to watch them.Cyber patrol on the processors is a lot like consensus building, one processor trusts another than it also trusts the chain of processors.

The race is that no side processor can be activated before any protocol reaches a safe checkpoint.   This is an extremely difficult counterfeit, and is soon noticed at the notary level.   We can do this today, for the data center, maybe just replace the cisco layer.

No comments: