Snowden and Compilers
drwho at virtadpt.net
Tue Feb 11 16:57:50 PST 2014
-----BEGIN PGP SIGNED MESSAGE-----
On 02/11/2014 02:17 PM, Troy Benjegerdes wrote:
> All the 'NDA'/proprietary/confidential information that goes with
> chip designs provide plenty of cover to insert backdoors.
We have already seen that they do not have to subvert the designs if
they can intercept components and replace them with boobytrapped look-
> But your USB chip, graphics card, hard drive, or two factor
> authentication token, on the other hand...
Firmware bootkits are also potential vectors. Why go to the trouble
of backdooring the hardware when you can go after the firmware blobs
that few bother to reverse engineer anyway?
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium: http://project-byzantium.org/
PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1
"We could be readin' a book." --Huey, _The Boondocks_
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
-----END PGP SIGNATURE-----
More information about the cypherpunks