Snowden and Compilers

John Young jya at pipeline.com
Thu Feb 13 13:16:42 PST 2014


Related papers by Arrigo Triulzi

@cynicalsecurity

posted to Twitter
today in response to this thread:

Project Maux Mk.II (2008) http://t.co/h1gDtV4Vlr

The Jedi Packet Trick takes over the Deathstar (2010) http://t.co/ENlITkJEoX

Project Booshoo or the Emporer's Modified Mind (2011) https://t.co/33trlpJkFG

-----

At 03:36 AM 2/13/2014, Bill Stewart wrote:
>At 06:42 PM 2/12/2014, Peter Gutmann wrote:
>> >http://www.livehacking.com/tag/network-card-backdoor/
>> >
>> >Proof of concept was been proven in 2010.  Practical application 
>> is probably
>> >being done by now.  Somebody is asleep behind the wheel if it is not.
>>
>>It was demonstrated well before then, Arrigo Triulzi had demonstrated running
>>an SSH server inside a NIC several years earlier.
>
>Back in the mid-80s I ran a secure computer center (with a huge VAX 11/780 :-)
>and the Army/DoD/NIST rules for secure computers needed to know who wrote the
>channel programs that the computer was using.  Channels were a 
>mainframe thing,
>which predated the VAX; the closest equivalent we had was a KMC11 processor
>that sat in the Unibus and handled interrupts and cooked-mode input 
>for the serial cards.
>
>So yes, proofs of concept have been around for a while :-)
>
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1744 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20140213/45572e35/attachment-0001.txt>


More information about the cypherpunks mailing list