tag:blogger.com,1999:blog-7321821.post111012713896537024..comments2023-12-13T04:18:15.075-08:00Comments on Blue Cat Blog: Remote physical device fingerprintingRuss Abbotthttp://www.blogger.com/profile/15431389045571531450noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-7321821.post-8767603188346224182019-12-17T02:04:55.230-08:002019-12-17T02:04:55.230-08:00I was just browsing through the internet looking f...I was just browsing through the internet looking for some information and came across your blog. I am impressed by the information that you have on this blog. It shows how well you understand this subject. Bookmarked this page, will come back for more. <a href="https://remoteiot.com/" rel="nofollow">remote device management</a>Anonymoushttps://www.blogger.com/profile/15825155893450750839noreply@blogger.comtag:blogger.com,1999:blog-7321821.post-1110679255906595772005-03-12T18:00:00.000-08:002005-03-12T18:00:00.000-08:00I came across your blog while searching on genetic...I came across your blog while searching on genetic programming. I thought your comment on resetting clocks to defeat the fingerprinting scheme based on clock skews was interesting. Unless of course someone comes up with a clock skew distinguishing technique for that minute period of time when the systems time hasnt been reset by a remote time server. I still think the best way to identify a system for security purposes is to hack the system because as long as the system belongs to a user they can do what they want with it, and like you rightly said also reset system times from remote time servers or not !. <BR/><BR/>Really liked the quotes on your webpage too.Anonymousnoreply@blogger.com