• vexikron@lemmy.zip
    link
    fedilink
    arrow-up
    2
    ·
    8 months ago

    I believe they are talking about systems that require the input of a … haha ‘closed source’ (meaning classified) physical hardware/software system that is completely non networked that requires a human being to be physically using /at least/ one entirely, totally sandboxxed device to complete the authentication process of accessing information on a networked device.

    Kind of like an extremely more advanced version of the enigma machine + codebook system.

    I may be wrong here though about specifically what they are referring to, I don’t actually have any actual experience with real milgrade cybersecurity stuff.

    The sort of cheapo way to do something like this is something I’ve seen at various points in my tech industry career, basically a yubikey or similar devices.