Hacker News new | past | comments | ask | show | jobs | submit login

Could you not define a set of operations on your potentially compromised hardware/software/system that should take time x if the system is uncompromised, and verify with a separate clock that the real time is either x or x+delta? This is based on the assumption that whatever the KTH does must require some amount of computation time to achieve.

Yes, the clock could be compromised too - but building your own clock from scratch is a lot easy than building your own computer, OS, lexer, compiler, etc.

[pre-posting edit - I see others have discussed this possibility too. I thus leave this comment purely as a testament to my own ascension to the rank of "Flaw-spotter".]




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: