Is then used to sign the child's name and picture. The key pair is initially not protected by a passphrase, and Takes their picture, and in the background generates an ECC key On first boot, a program is run that asks the child for their name, There is an interesting step which happens once a laptop is activated and Here is to deter thieves who would grab pallets of laptops without theĪctivation keys, those laptops would only be useful as spare parts. Used to enable the laptops sent specifically to that school. Once installed on a server there, the keys can be Keys to be generated in small batches and shipped, on a USB key, to theĭestination schools. Those it will be able to create the activation keys. The customer countries will have lists of serial and UUID numbers from Of a special activation key generated from the serial number and UUID. Out in a non-functional, deactivated state making it work involves the use With unique, randomly-generated serial and UUID numbers. The process starts at manufacturing time, when each laptop will be equipped Very limited use of public-key encryption infrastructure, and no permanent The associated goals include no user passwords, no unencryptedĪuthentication, a system which is secure when it is first powered on, a The user will not be pestered by popups with security-related questions. Not mean that security won't ever get in the way instead, it means that Read, and the security mechanism must be unobtrusive. Software design secrets, it must be possible for users to gain completeĬontrol over the system, security cannot depend on the user being able to OLPC project has taken so far: security cannot depend on hardware or The principles are consistent with the approach the Permissions model, the Bitfrost specification gets into the overriding ![]() Information on what Bitfrost will do, but very little on how it will beĪfter an introduction on the shortcomings of the traditional Unix file ![]() "Bitfrost," which, it is hoped, will keep OLPC systems out of trouble andĪvailable for their owners. Ivan and company have come up with a platform named Initial results of his work, done with help from Simson Garfinkel, have nowįor comments. The person charged with the OLPC's security thinking is Ivan Krstić. Significant thought needs to go into how to prevent them. List of educational objectives, so it stands to reason that some None of these activities feature highly on the OLPC project's The systems willīe obvious targets for theft, self-propagating malware, and the creation ofīotnets. Will be managed by people who are not security experts. ![]() Systems will be deployed into some remote parts of the world, where they The One Laptop Per Child platform was always going to present some
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |