ASML Holding and Taiwan Semiconductor Manufacturing Co. have ways to disable the world’s most advanced chip-making machines in the event that China invades Taiwan, according to people familair with the matter.
Geopolitics aside, the technical architecture implementation of this mechanism is really interesting for me. I think over all, having extra ability to disable these systems would prevent US launching attacks against the plants — which could cause spill over local civilian injuries — but there’s just so many more things to consider.
Is it a dead-man switch style of setup, where if it doesn’t get authorization from HQ after some time, it will stop working? Or is it a kill switch style of setup, where they can remotely issue a command to stop operation? Because different vectors then come up depending on the securing method. For example: Dead-man switch might be tricked/overcame by turning back the clock, whereas kill switch might be circumvented by severing the network connection before the command could be issued (literally cut the underwater cables before they start the invasion).
How is the mechanism itself secured? If it is certificate based like everything else, then we’d have to worry about the certificate signing authority getting pressured into signing certificates by state backed actors.
Would really love to learn about the setup one day after all these is over, to learn about the thinkings that’s been done on such an important piece of … “infrastructure”?
Geopolitics aside, the technical architecture implementation of this mechanism is really interesting for me. I think over all, having extra ability to disable these systems would prevent US launching attacks against the plants — which could cause spill over local civilian injuries — but there’s just so many more things to consider.
Is it a dead-man switch style of setup, where if it doesn’t get authorization from HQ after some time, it will stop working? Or is it a kill switch style of setup, where they can remotely issue a command to stop operation? Because different vectors then come up depending on the securing method. For example: Dead-man switch might be tricked/overcame by turning back the clock, whereas kill switch might be circumvented by severing the network connection before the command could be issued (literally cut the underwater cables before they start the invasion).
How is the mechanism itself secured? If it is certificate based like everything else, then we’d have to worry about the certificate signing authority getting pressured into signing certificates by state backed actors.
Would really love to learn about the setup one day after all these is over, to learn about the thinkings that’s been done on such an important piece of … “infrastructure”?