![]() |
SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997 |
![]() |
#1 |
Soaring
|
![]()
An expert's assessement:
https://www.schneier.com/blog/archiv...titiously.html And here is the original study: http://people.umass.edu/gbecker/BeckerChes13.pdf German source that had me finding it: http://www.spiegel.de/netzwelt/gadge...-a-922853.html
__________________
If you feel nuts, consult an expert. |
![]() |
![]() |
![]() |
#2 |
Stowaway
Posts: n/a
Downloads:
Uploads:
|
![]()
Shouldn't the thread title be "Hypothetical hardware trojans possibly messing with chip production if you believe the conspiracy theory"?
|
![]() |
![]() |
#3 |
Soaring
|
![]()
shouldn't reason dictate to assume the NSA does what is possible as long as it has not been proven that it has not? Its not as if the revelations of the past weeks and months have just been a conspiracy fantasy.
Its technically possible, and the NSA has approached all major softwrae companies including Microsoft, Google, Yahoo, Apple etc. in order to get access codes to encryption coding and security protocoles. Even more, US laws make cooperation of companies with the NSA mandatory and legally binding, if it demands it.
__________________
If you feel nuts, consult an expert. |
![]() |
![]() |
![]() |
#4 | |
Stowaway
Posts: n/a
Downloads:
Uploads:
|
![]() Quote:
|
|
![]() |
![]() |
#5 | |
Fleet Admiral
|
![]() Quote:
![]() ![]()
__________________
![]() |
|
![]() |
![]() |
![]() |
#6 |
Fleet Admiral
|
![]()
Interesting article. It wouldn't be hard to hide special circuits in the chip.
![]()
__________________
![]() |
![]() |
![]() |
![]() |
#7 | |
Chief of the Boat
|
![]() Quote:
![]() |
|
![]() |
![]() |
![]() |
#8 |
Fleet Admiral
|
![]()
__________________
![]() |
![]() |
![]() |
![]() |
#9 | |
Soaring
|
![]() Quote:
Things like what Der Spiegel summarises, that you manipulate the entropy levels in certain randomization functions of the chip, are no difficult implementation, still would be extremely difficult for the end user to recognise as long as he does no9t run long, systematic test sessions with randomised function and umber generation and analysing the probability distribution. For the technical potential of somebody like the NSA, a degrading from 64 to 32 bit only already would tremendously simplify the task to break any randomised security code used by OS routines by using brute processor force to burn through. That is the ideal entry opportunity for an actor like the NSA: it's potent, but unsuspicious, and difficult to unveil. It also is just the logcal next step, even the logically enforced next step. First there were soft trojans and virusses, rootkits and the like. Next operating systems get corrupted. Infiltrating the hardware during the production, is the next step. And is it really that new? Some time ago there was a debate about Chinese computer tech and especially chips being used in practically every American hightech weapon system, ever cruise missiles, every platform electronics. I already back then, two years ago it was or so, said I find it insane that one builds one owns weapons by using c hips and electronics produced by one's most pressing rival and possible future war enemy. At the same time the Americans import construction materials even like simple bricks and concrete parts when they build a new embassy in some foreign "friendly" nation like over here, for fears of getting bugged components if buying them from regional sub contractors. And at the same time they even hack friendly governments internal communication networks. Trust me. Chip producers ARE under pressure by the NSA to build in backdoors into their hardware. I take that as 99% certain. It's technically possible, it is a benefit for the NSA, they can do it and demand it, the Patriot Act still is in effects well, and "national security" is a magic spell that immediately ends all discussion and all resistance - and so hardcoding backdoors in chips for sure gets done.
__________________
If you feel nuts, consult an expert. |
|
![]() |
![]() |
![]() |
#10 | |
Stowaway
Posts: n/a
Downloads:
Uploads:
|
![]() Quote:
Whether the story is true or not should actually make no difference to most people anyway - if you are that worried about security, don't use a computer for anything you don't want others to know about. That was good advice before this story came out, and it is good advice now. Worrying about dopant-level tampering on microchips while using an operating system you can't be sure hasn't been tampered with anyway is rather pointless. |
|
![]() |
![]() |
#11 |
Soaring
|
![]()
Avoiding to learn lessons by dreaming sweet dreams of a friendlier, though more unlikely world has one precondition: being asleep.
__________________
If you feel nuts, consult an expert. |
![]() |
![]() |
![]() |
#12 | |
Stowaway
Posts: n/a
Downloads:
Uploads:
|
![]() Quote:
I've already explained that whether these 'trojans' exist or not should make no difference one way another to my behaviour. Is it going to make any difference to yours? |
|
![]() |
![]() |
#13 |
Admiral
![]() Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
|
![]()
Ahh, Skybird, at your level of paranoia, you should just step away from the computer and maybe go play with a calculator man.
I am sure that the Intel Xeon 5***, 3***, E3, and E5 lines have working random number generators. Why? since Intel's Xeon line has been tested and certified many times by multiple parties, and is widely used in the gambling and financial industries. hey man, if gambling companies running millions of random number generators per second can't detect anything deviation from the norm, I think I should be fine, encrypting my pornography with a Xeon don't you think? Also, this: ![]() |
![]() |
![]() |
![]() |
#14 |
Rear Admiral
![]() |
![]() ![]() HunterICX
__________________
![]() |
![]() |
![]() |
![]() |
#15 | ||
XO
![]() Join Date: Apr 2005
Location: Thuringia
Posts: 429
Downloads: 16
Uploads: 0
|
![]() Quote:
Quote:
Then everyone is seeing the conspiracies everywhere... ![]() |
||
![]() |
![]() |
![]() |
|
|