[148908] in cryptography@c2.net mail archive
Re: [Cryptography] nuclear arming codes
daemon@ATHENA.MIT.EDU (Joe St Sauver)
Fri Jan 3 14:17:20 2014
X-Original-To: cryptography@metzdowd.com
Date: Fri, 3 Jan 2014 11:08:15 -0800 (PST)
From: "Joe St Sauver" <joe@oregon.uoregon.edu>
To: zenadsl6186@zen.co.uk
X-VMS-To: SMTP%"zenadsl6186@zen.co.uk"
Cc: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
Hi,
Peter Fairbrother commented:
#One technique I'm told is still in use is to affix glitter in random
#patterns in clear epoxy to missile and/or warhead parts, then shine
#lights on it from variable positions and compare the return sparkle
#images to a known set for that patch. Very hard to forge.
And that technique was even covered by Wired, albeit with a different context:
"Don't Want Your Laptop Tampered With? Just Add Glitter Nail Polish"
http://www.wired.com/threatlevel/2013/12/better-data-security-nail-polish/
Regards,
Joe
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography