compoobah at valleyimplants.com
Wed Aug 23 20:06:08 CDT 2006
> And you have to ensure that there is *no* way the user can
>execute code *before* your interpreter/virtual machine/etc.
>gains control of the CPU. I.e., at the very least, you
>need physical control over the machine. This isnt possible
>in all cases (e.g., a consumer device!)
You can make it very difficult, though.
The X-box uses cryptographic hashes, the AS/400 uses completely undocumented (in the public sphere)
More information about the cctech