www.delorie.com/archives/browse.cgi   search  
Mail Archives: geda-user/2015/08/10/09:01:59

X-Authentication-Warning: delorie.com: mail set sender to geda-user-bounces using -f
X-Recipient: geda-user AT delorie DOT com
X-Virus-Status: Clean
X-Virus-Scanned: clamav-milter 0.98.4 at av01.lsn.net
Message-ID: <55C8A0B1.6050503@ecosensory.com>
Date: Mon, 10 Aug 2015 08:01:37 -0500
From: John Griessen <john AT ecosensory DOT com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.7.0
MIME-Version: 1.0
To: geda-user AT delorie DOT com
Subject: Re: [geda-user] Open Source FPGA Flow
References: <CAOuGh8-=jvv7tEaDTnsVF2gNKckA+hT1G21mNOQ-XPx9yC04cA AT mail DOT gmail DOT com> <CAM2RGhTvWfGWkz6O5JFoqbNS-RVUnC-0Y9zCoJdRVWy39CjzcA AT mail DOT gmail DOT com>
In-Reply-To: <CAM2RGhTvWfGWkz6O5JFoqbNS-RVUnC-0Y9zCoJdRVWy39CjzcA@mail.gmail.com>
Reply-To: geda-user AT delorie DOT com

On 08/09/2015 09:52 PM, Evan Foss (evanfoss AT gmail DOT com) [via geda-user AT delorie DOT com] wrote:
> I find the geda reference utterly incomprehensible but I dig the meerkats!

They're what-iffing about making an end to end user verifiable crypto system.
Down to the making of many separately fabbed custom chips, (so they could have
a comparison of them to find any hidden internal "back doors" in any one implementation).

Quite the logical string of thoughts to the extreme, but then, the internet server attacks are
extreme and continual today.

- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019