Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CLASSIC_COMPUTER    |    Classic Computers    |    1,530 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,188 of 1,530    |
|    Jeff Thiele to Mike Powell    |
|    Re: recent projects    |
|    13 Aug 22 11:00:00    |
      TID: Mystic BBS 1.12 A46       MSGID: 1:387/26 8e1bb436       REPLY: 1208.clascomp@1:2320/105 275ce5bc       TZUTC: -0500       On 13 Aug 2022, Mike Powell said the following...        MP> As the SBC it was all running on is public facing, I didn't want the        MP> version of linux running under it all to get too long in the tooth.         MP> Once I upgraded it, I could never get it all working again.              This is the main reason I prefer FPGAs to emulation on an SBC for       public-facing projects such as BBSs, although this has really got me       thinking about security on FPGA-based hardware.              Right now, I have a Raspberry Pi running Mystic BBS software. If a caller       were able to break that software, they could possibly gain access to the       underlying OS, which is plenty powerful enough to go exploring my home       network, even without root privileges. It's not public-facing, for that       reason.              A BBS running on an emulated system, itself running on a Raspberry Pi, is       perhaps slightly more complicated, but not all that different. If someone       were able to break the BBS software, they might be able to gain access to the       emulated system (more on that below). Breaking that, they'd be able to access       the underlying modern OS.              A BBS running on DEC OS/8, running on an FPGA implementation of a PDP-8 would       be a different story, I thought before writing this, because there's nowhere       to go after breaking the PDP-8 FPGA implementation; beyond that is only       hardware.              So a malicious caller would, at best, have a PDP-8 system with a WiFi modem       at their disposal. Could that be used to wreak havoc on the local network?       Yes, given someone with enough PDP-8 knowledge, I now believe it could. It       wouldn't be easy, but it would be possible.              Hmm.              Jeff.              --- Mystic BBS v1.12 A46 2020/08/26 (Raspberry Pi/32)        * Origin: Cold War Computing BBS (1:387/26)       SEEN-BY: 1/123 15/0 18/200 19/38 50 90/1 105/81 106/201 633 987 120/340       SEEN-BY: 123/131 124/5014 5016 129/305 331 130/330 153/7715 154/10       SEEN-BY: 218/700 227/114 229/111 112 113 206 317 400 424 426 428 452       SEEN-BY: 229/470 664 700 266/512 280/464 282/1038 292/854 317/3 320/219       SEEN-BY: 322/757 342/200 387/25 26 396/45 460/58 633/280 712/848       PATH: 387/26 396/45 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca