John W
When something that ambiguous, and which that could be construed as being a requirement, is placed in a prominent position in a standard, regardless or not of whether the clause in question is numbered, then it is obvious that it will (as it has done) raise issues and questions as to the potential effects on many other parts of that standard . BTW: it has been widely and authoritatively stated that 62368 is not a “Risk Assessment” standard, and appropriate rationales and requirements are thus given therein – but to then include an undefined term which might then be construed as a “requirement” is an open invitation for someone to decide that “he” has to risk assess how “tamper-proof” a particular design safety feature actually might be. Those are some of the reasons why I consider that the term in question should never have been included in the first place. John E Allen W. London, UK From: John Woodgate [mailto:[email protected]] Sent: 09 April 2019 09:40 To: John Allen; [email protected] Subject: Re: [PSES] Tamper-proof Hardware I think that the major point is that Clause 0 is purely advisory. It seems reasonable in an advisory text to mention means to deter operations that might compromise safety, without going into exhaustive detail. It would seem harmless, so not worthy of suppression. I wouldn't have given the INTRODUCTION a clause number, because it creates an impression that it is normative. But then there are 10^6 things in 62368-1 that I would have done differently. Best wishes John Woodgate OOO-Own Opinions Only J M Woodgate and Associates www.woodjohn.uk Rayleigh, Essex UK On 2019-04-09 09:11, John Allen wrote: Rich Thanks for laying out the main definitions of “tamperproof”, and for your view on why my “story” is not an example thereof (it was only the one that I had “to-hand” at the time, and there must be many others J) . Maybe, therefore, similar definitions/explanations should have been included in IEC 62368, so as to make it (much!) clearer to designers and testing/certification personnel as to the intent of the requirement because (obviously) there can be a considerable spread of interpretations of the requirement - or else John Cochran (and probably many others!) would not ask the question. As it stands, that “requirement” must thus be considered to be “ambiguous” at best, and therefore shouldn’t have been included in a standard in that form (I’m sure there must be a word to describe a definition with four different possible interpretations, but I’m afraid I don’t know it and thus “ambiguous” is the best that I can offer ATM!). In fact, given the definitions you quote, I would suggest that the term should NOT have been included in the standard at all because they imply the likelihood of various levels of intentional interference/criminality on the parts of possible perpetrators. However, it should not have been the intent of the 62368 standards-writing teams to address such issues - maybe YES if it were in a theft/ building-intrusion/ forgery prevention (etc.) standard, but NO in a broadly-targeted product safety standard. John E Allen W. London, UK From: Richard Nute [mailto:[email protected]] Sent: 08 April 2019 23:40 To: [email protected] Subject: Re: [PSES] Tamper-proof Hardware >From dictionary.com: tamperproof adjective 1 that cannot be tampered with; impervious to tampering tamper verb (used without object) 1 to meddle, especially for the purpose of altering, damaging, or misusing (usually followed by with ) 2 to make changes in something, especially in order to falsify (usually followed by with ) 3 to engage secretly or improperly in something. 4 to engage in underhand or corrupt dealings, especially in order to influence improperly (usually followed by with ) The example provided by John Allen (UK) is not tampering as he did not take the unit apart for any of the above reasons. Using the above definitions, the reasons for using any “tamperproof” construction assumes nefarious objectives on the part of the equipment users. Best regards, Rich From: John Allen <mailto:[email protected]> <[email protected]> Sent: Monday, April 8, 2019 2:29 PM To: [email protected] Subject: Re: [PSES] Tamper-proof Hardware IMHO, the subject of “tamper-proofing devices” will be around for a “long time” because, once a “new” device is introduced, then “someone” will (pretty soon!) come up with a “workaround” – it’s just a case of when the workaround becomes available, and then when will someone find and use it, and NOT if they will! L By way of example, today I finally looked to see if I could fix an old non-functional plug-in mains-supplied timer, but then found that the 2 parts of the body were secured by “tamper-proof” screws, which were roughly like a normal flat-blade screw head, but with a gap in the centre for a spigot on the end of the removal tool – which I have had in the toolbox for, probably, nearly a decade! Thus I had the timer apart in a few minutes (and then found the cause of the problem quite quickly). Thus it’s a matter of “not if”, but “when”. OTOH, to “come down to ground” - in practice, it all comes down to the question as to whether the “intended users” are likely to be able to find the workaround, and would then want to, bypass the safety measures ?????? John E Allen W. London, UK - ---------------------------------------------------------------- This message is from the IEEE Product Safety Engineering Society emc-pstc discussion list. To post a message to the list, send your e-mail to <[email protected]> All emc-pstc postings are archived and searchable on the web at: http://www.ieee-pses.org/emc-pstc.html Attachments are not permitted but the IEEE PSES Online Communities site at http://product-compliance.oc.ieee.org/ can be used for graphics (in well-used formats), large files, etc. Website: http://www.ieee-pses.org/ Instructions: http://www.ieee-pses.org/list.html (including how to unsubscribe) <http://www.ieee-pses.org/list.html> List rules: http://www.ieee-pses.org/listrules.html For help, send mail to the list administrators: Scott Douglas <[email protected]> Mike Cantwell <[email protected]> For policy questions, send mail to: Jim Bacher <[email protected]> David Heald <[email protected]> - ---------------------------------------------------------------- This message is from the IEEE Product Safety Engineering Society emc-pstc discussion list. To post a message to the list, send your e-mail to <[email protected]> All emc-pstc postings are archived and searchable on the web at: http://www.ieee-pses.org/emc-pstc.html Attachments are not permitted but the IEEE PSES Online Communities site at http://product-compliance.oc.ieee.org/ can be used for graphics (in well-used formats), large files, etc. Website: http://www.ieee-pses.org/ Instructions: http://www.ieee-pses.org/list.html (including how to unsubscribe) <http://www.ieee-pses.org/list.html> List rules: http://www.ieee-pses.org/listrules.html For help, send mail to the list administrators: Scott Douglas <[email protected]> Mike Cantwell <[email protected]> For policy questions, send mail to: Jim Bacher <[email protected]> David Heald <[email protected]> - ---------------------------------------------------------------- This message is from the IEEE Product Safety Engineering Society emc-pstc discussion list. To post a message to the list, send your e-mail to <[email protected]> All emc-pstc postings are archived and searchable on the web at: http://www.ieee-pses.org/emc-pstc.html Attachments are not permitted but the IEEE PSES Online Communities site at http://product-compliance.oc.ieee.org/ can be used for graphics (in well-used formats), large files, etc. Website: http://www.ieee-pses.org/ Instructions: http://www.ieee-pses.org/list.html (including how to unsubscribe) List rules: http://www.ieee-pses.org/listrules.html For help, send mail to the list administrators: Scott Douglas <[email protected]> Mike Cantwell <[email protected]> For policy questions, send mail to: Jim Bacher: <[email protected]> David Heald: <[email protected]>

