trusting the processor chip

Rick Smith smith at sctc.com
Fri Apr 26 22:19:21 PDT 1996


At 10:23 AM 4/26/96, jim bell wrote:

> By NSA standards, it is simple.  NSA has probably had its own
> semiconductor  fabs for 30+ years.

Yep. Regardless of whether the fabs are government property or not,
it's a sure thing that some contractors have appropriately SCIFfed
fabs and appropriately cleared staffs.

> Even if we assume that
> their capabilities lag  commercial production in terms of
> density or quality, keyboard encoder chips  were trivial 20+
> years ago and could presumably be easily
> duplicated/modified today by even the oldest operating fabs.
> They probably  had far less than 10,000 transistors.  Even
> modern keyboard controllers  probably "waste"  a
> microcontroller with far more capability than you'd need
> for the task, and microcontrollers usually have
> substantially more code area  than would be necessary to add
> some sort of surreptitious function.

Agree. Keyboard controllers (and other peripheral components
of a system) are a much more tractable target than the CPU and
may be within the capbailities of such organizations. I'm more
inclined towards disk controller subversion myself. Of course,
there's also the apocryphal story of the so called "Iraqi
printer virus" that disabled the Iraqi air defense system.

Subverting the CPU is not simple even by NSA standards.

Rick.
smith at sctc.com        secure computing corporation








More information about the cypherpunks-legacy mailing list