<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Sun, Dec 27, 2015 at 10:31 AM, John Denker <span dir="ltr"><<a href="mailto:jsd@av8n.com" target="_blank">jsd@av8n.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">On 12/26/2015 09:53 PM, Dave Horsfall wrote:<br>
<br>
> A good hot flame? What's the melting point of gold and silicon, anyway?<br>
<br>
</span>material MP / °C<br>
-------- -------<br>
Aluminum: 660<br>
Silicon: 1,414<br>
SiO2: 1,600<br>
Al2O3: 2,072<br>
Gold: 1,064 (irrelevant, but since you asked)<br></blockquote><div><br></div><div>Metal layers are aluminum, copper and tungsten yet the quality of the </div><div>transistors can be baked away at temps well below melting. Diffusion</div><div>requires precision so modest temp soak can disable the gates.<br><br>Pulling this back to crypto. <br>Most USB memory keys contain vendor software </div><div>to encrypt the content and drivers that allow the </div><div>reading and writing.<br><br>Are any of these vendor solutions any good? <br>I expect most are compromised so I format and repartition devices ASAP. </div><div>What alternatives might there be to replace vendor tools?<br>In some cases a user space driver can allow</div><div>views when the OS anchored tools are difficult to trust.<br><br>Virtual machines can be given raw access to devices.<br>Is that access raw enough that VM hosted OS qualities</div><div>apply? </div><div><br></div><div>Assertion(this may be true). I believe, if a device was properly encrypted </div><div>I do not care if all the blocks (spares, defects, spares) are out of my control?</div></div><br clear="all"><div><br></div>-- <br><div class="gmail_signature"><div dir="ltr"> T o m M i t c h e l l</div></div>
</div></div>