On Jul 12, 2010, at 11:22 AM, Perry E. Metzger wrote: > The > literature makes it clear at this point that short of carefully > tearing apart and analyzing the entire chip, you're not going to catch > subtle behavioral changes designed to allow attackers backdoor > access.
I happen to be re-reading Vernor Vinge's _A Deepness in the Sky_ right now. In it, a conquering power needs to use the computing and communication technology of its subjugated foe, and has unusual resources to carry out a thorough code audit. However, the foe has been hiding secrets since before the victors were fooling with electricity ...
smime.p7s
Description: S/MIME cryptographic signature