On Thu, Dec 05, 2013 at 04:20:42AM -0800, Paul R. Ramer wrote:
> Peter Lebbing <pe...@digitalbrains.com> wrote:
> >On 02/12/13 20:37, Andreas Schwier (ML) wrote:
> >> Wait a second - you can not simply hide a backdoor in a Common
> >Criteria
> >> evaluated operating system. There are too many entities that would
> >need
> >> to be involved in the process
> >
> >Why couldn't the manufacturer simply put a different, backdoored
> >firmware in the
> >card ROM than the one they showed to the other entities? Are those
> >other
> >entities physically examining the ROM mask of the final product or
> >somehow
> >bypassing the code protection and reading out the flash ROM?
> 
> On that note, why assume that the manufacturer would not do the opposite: 
> feign helping the spy agency by giving them a compromised ROM and then 
> substituting a secure one on the real product. In either case, we are 
> assuming the company would try to supply different bodies with different ROMs.

Probably because the company might be open to criminal charges. I
understand that the NSA has used this threat in the past.

-- 
Bob Holtzman
Your mail is being read by tight lipped 
NSA agents who fail to see humor in Doctor 
Strangelove 
Key ID 8D549279

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to