![]() |
SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997 |
|
![]() |
#1 |
Soaring
|
![]()
An expert's assessement:
https://www.schneier.com/blog/archiv...titiously.html And here is the original study: http://people.umass.edu/gbecker/BeckerChes13.pdf German source that had me finding it: http://www.spiegel.de/netzwelt/gadge...-a-922853.html
__________________
If you feel nuts, consult an expert. |
![]() |
![]() |
![]() |
#2 |
Stowaway
Posts: n/a
Downloads:
Uploads:
|
![]()
Shouldn't the thread title be "Hypothetical hardware trojans possibly messing with chip production if you believe the conspiracy theory"?
|
![]() |
![]() |
#3 |
Soaring
|
![]()
shouldn't reason dictate to assume the NSA does what is possible as long as it has not been proven that it has not? Its not as if the revelations of the past weeks and months have just been a conspiracy fantasy.
Its technically possible, and the NSA has approached all major softwrae companies including Microsoft, Google, Yahoo, Apple etc. in order to get access codes to encryption coding and security protocoles. Even more, US laws make cooperation of companies with the NSA mandatory and legally binding, if it demands it.
__________________
If you feel nuts, consult an expert. |
![]() |
![]() |
![]() |
#4 | |
Stowaway
Posts: n/a
Downloads:
Uploads:
|
![]() Quote:
|
|
![]() |
![]() |
#5 | |
Soaring
|
![]() Quote:
Things like what Der Spiegel summarises, that you manipulate the entropy levels in certain randomization functions of the chip, are no difficult implementation, still would be extremely difficult for the end user to recognise as long as he does no9t run long, systematic test sessions with randomised function and umber generation and analysing the probability distribution. For the technical potential of somebody like the NSA, a degrading from 64 to 32 bit only already would tremendously simplify the task to break any randomised security code used by OS routines by using brute processor force to burn through. That is the ideal entry opportunity for an actor like the NSA: it's potent, but unsuspicious, and difficult to unveil. It also is just the logcal next step, even the logically enforced next step. First there were soft trojans and virusses, rootkits and the like. Next operating systems get corrupted. Infiltrating the hardware during the production, is the next step. And is it really that new? Some time ago there was a debate about Chinese computer tech and especially chips being used in practically every American hightech weapon system, ever cruise missiles, every platform electronics. I already back then, two years ago it was or so, said I find it insane that one builds one owns weapons by using c hips and electronics produced by one's most pressing rival and possible future war enemy. At the same time the Americans import construction materials even like simple bricks and concrete parts when they build a new embassy in some foreign "friendly" nation like over here, for fears of getting bugged components if buying them from regional sub contractors. And at the same time they even hack friendly governments internal communication networks. Trust me. Chip producers ARE under pressure by the NSA to build in backdoors into their hardware. I take that as 99% certain. It's technically possible, it is a benefit for the NSA, they can do it and demand it, the Patriot Act still is in effects well, and "national security" is a magic spell that immediately ends all discussion and all resistance - and so hardcoding backdoors in chips for sure gets done.
__________________
If you feel nuts, consult an expert. |
|
![]() |
![]() |
![]() |
#6 | |
Stowaway
Posts: n/a
Downloads:
Uploads:
|
![]() Quote:
Whether the story is true or not should actually make no difference to most people anyway - if you are that worried about security, don't use a computer for anything you don't want others to know about. That was good advice before this story came out, and it is good advice now. Worrying about dopant-level tampering on microchips while using an operating system you can't be sure hasn't been tampered with anyway is rather pointless. |
|
![]() |
![]() |
#7 | ||
XO
![]() Join Date: Apr 2005
Location: Thuringia
Posts: 429
Downloads: 16
Uploads: 0
|
![]() Quote:
Quote:
Then everyone is seeing the conspiracies everywhere... ![]() |
||
![]() |
![]() |
![]() |
#8 |
Soaring
|
![]()
Where motive meets occasion, and historic precedence is proven to be there and unlimited resources are available - there shall be nothing coming from it, although it is the state, the secret service?
That assumption is the real conspiracy theory here. Some people obviously have learned nothing, really nothing from the revelations by Snowden, and info becoming available on the NSA (maongst other things). The nSA's budget has more than doubled since 9/11, as claimed: due to the war on terror. But fact also is that internal papers prove that just one third of its work is aimed at fighting Islamic terrorism. We know that the spy like crazy on other govenrment, friends and enemies alike, and have bugged international organizations and their headquarters, from the EU to the UN. We also know that they build enormous data storage capacities. And that computerized automatization makes possible an automatic data collecting and recording that is almost complete - globally. I add 1 and 1, and to not my surprise I get a result of 2. Some of you claim it is 1, or there is no result. You are wrong.
__________________
If you feel nuts, consult an expert. Last edited by Skybird; 09-19-13 at 06:55 AM. |
![]() |
![]() |
![]() |
#9 |
Stowaway
Posts: n/a
Downloads:
Uploads:
|
![]()
By the same 'logic' (ROFL), since we have no way to determine that Skybird isn't a NSA plant, we can be certain that he is. Therefore he is lying. Therefore the NSA isn't tampering with microchips...
|
![]() |
![]() |
#10 | |
Fleet Admiral
|
![]() Quote:
![]() ![]()
__________________
![]() |
|
![]() |
![]() |
![]() |
#11 |
Fleet Admiral
|
![]()
Interesting article. It wouldn't be hard to hide special circuits in the chip.
![]()
__________________
![]() |
![]() |
![]() |
![]() |
#12 | |
Chief of the Boat
|
![]() Quote:
![]() |
|
![]() |
![]() |
![]() |
#13 |
Fleet Admiral
|
![]()
__________________
![]() |
![]() |
![]() |
![]() |
#14 |
Soaring
|
![]()
Avoiding to learn lessons by dreaming sweet dreams of a friendlier, though more unlikely world has one precondition: being asleep.
__________________
If you feel nuts, consult an expert. |
![]() |
![]() |
![]() |
#15 | |
Stowaway
Posts: n/a
Downloads:
Uploads:
|
![]() Quote:
I've already explained that whether these 'trojans' exist or not should make no difference one way another to my behaviour. Is it going to make any difference to yours? |
|
![]() |
![]() |
|
|