Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

2
  • Okay, but if all we need is tamper-evidence then a cheap $500 server box locked in a metal enclosure over an Ethernet link provides the same functionality... If the attacker can wield angle grinders in the server room to cut the enclosure, then they can surely remove an HSM from the room altogether and use it elsewhere at their leisure, no? If they can't, then all they do is still talk over the command interface. Commented 2 days ago
  • I think my key question is "when physical anti-tampering starts to matter, then the attacker is already in a position to use the HSM as an oracle, so whether the attacker can extract raw keys in addition to using them over an oracle interface doesn't sound like much a difference". Commented 2 days ago