this post was submitted on 26 Dec 2023
126 points (99.2% liked)

Technology

58692 readers
3985 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Note: I am not affiliated with the project

you are viewing a single comment's thread
view the rest of the comments
[–] dannym@lemmy.escapebigtech.info 21 points 9 months ago* (last edited 9 months ago) (1 children)

The specs are literally the reason why people would buy this. It's basically the best device we have available that can be used as a base for devices handling secure computation, or software handling secure computation. Think of a FIDO2 key, or a gpg smartcard, all secure and verifiable

[–] dragontamer@lemmy.world 4 points 9 months ago* (last edited 9 months ago) (2 children)

Ehhhh... I'd recommend a Teensy instead, or a variety of other microprocessors. At $72, this is awful value. And there seems to be no specifications with regards to power-consumption.

https://www.pjrc.com/store/teensy41.html

Teensy 4.1 gives you Hardware Floating point, 100 MBit Ethernet, USB, 600MHz, 1024kB of SRAM, 7MB of Flash for like $35 and within ~100mA of current usage at this 600MHz speed, meaning it easily runs off of AA Batteries for over a day with just a bit of idle/sleep cycles.

[–] dannym@lemmy.escapebigtech.info 4 points 9 months ago* (last edited 9 months ago)

there are use cases, such as security, where you want as few instructions as possible, so a full ARM processor isn't the best idea. You may want to read the threat model page: https://tillitis.se/products/threat-model/

[–] BearOfaTime@lemm.ee 1 points 9 months ago

Wow.

I have no idea what I'd use it for (or even how to use it) but I want one!