delorie.com/archives/browse.cgi | search |
X-Authentication-Warning: | delorie.com: mail set sender to geda-user-bounces using -f |
X-Recipient: | geda-user AT delorie DOT com |
X-Virus-Status: | Clean |
X-Virus-Scanned: | clamav-milter 0.98.4 at av01.lsn.net |
Message-ID: | <55C8A0B1.6050503@ecosensory.com> |
Date: | Mon, 10 Aug 2015 08:01:37 -0500 |
From: | John Griessen <john AT ecosensory DOT com> |
User-Agent: | Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.7.0 |
MIME-Version: | 1.0 |
To: | geda-user AT delorie DOT com |
Subject: | Re: [geda-user] Open Source FPGA Flow |
References: | <CAOuGh8-=jvv7tEaDTnsVF2gNKckA+hT1G21mNOQ-XPx9yC04cA AT mail DOT gmail DOT com> <CAM2RGhTvWfGWkz6O5JFoqbNS-RVUnC-0Y9zCoJdRVWy39CjzcA AT mail DOT gmail DOT com> |
In-Reply-To: | <CAM2RGhTvWfGWkz6O5JFoqbNS-RVUnC-0Y9zCoJdRVWy39CjzcA@mail.gmail.com> |
Reply-To: | geda-user AT delorie DOT com |
On 08/09/2015 09:52 PM, Evan Foss (evanfoss AT gmail DOT com) [via geda-user AT delorie DOT com] wrote: > I find the geda reference utterly incomprehensible but I dig the meerkats! They're what-iffing about making an end to end user verifiable crypto system. Down to the making of many separately fabbed custom chips, (so they could have a comparison of them to find any hidden internal "back doors" in any one implementation). Quite the logical string of thoughts to the extreme, but then, the internet server attacks are extreme and continual today.
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |