this post was submitted on 07 Aug 2023
346 points (97.0% liked)

linuxmemes

20707 readers
1206 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 25 points 1 year ago* (last edited 1 year ago) (2 children)

I haven't kept up with it, but OpenCores is a balwark against this type of thing. FPGAs, while not as efficient as fab silicon, AFAIK lets one implement CPUs, interconnects and peripherals without any predefined channels to target for subversion. The NSA or other boogeymen couldn't craft a backdoor for your FPGA CPU, since the FPGA is just a 'blank slate' until programmed so they have no idea even what to attack beforehand. The chip could be literally anything once programmed. FPGAs by design have to faithfully implement the basic gates, with no jiggery-pokery, otherwise it would be evident immediately that something was up. Right?

[–] [email protected] 13 points 1 year ago (1 children)

I honestly do not know. Couldn’t the FPGA hide a backdoor routine on some kind of ROM?

[–] [email protected] 10 points 1 year ago

Sure, but it wouldn't be a backdoor into your ROM.

[–] [email protected] 5 points 1 year ago* (last edited 1 year ago)

FPGAs are mostly proprietary products with proprietary technology inside. Many also have "hard" IP blocks for various things sometimes including a "hard" ARM based computer subsystem.

If you are getting one and flashing your own CPU to it it will be harder to attack, but definitely not impossible. There have been vulnerabilities in FPGAs before.