Am 08.12.2013 11:51, schrieb Paul R. Ramer:
Peter Lebbing <pe...@digitalbrains.com> wrote:
We're debating the risk that a card is backdoored. If there is such a
risk, that
risk still exists if we allow for the possibility that manufacturers
try to do
what you say. They're not mutually exclusive; how come you infer that I
assume
that the manufacturer would not do the opposite?
It was not my intent to make it seem that I had made any insinuations on your 
part.  It was more that I wanted to express an alternate possibility rather 
than the nefarious one that was being discussed.

It seemed that the only scenario involving pressure or coercion on the part of 
the U.S. being discussed was one of compliance by the company rather than a 
range of possibilities.  Events in life do not always happen neatly and 
predictably.  If we are going to discuss outcomes, we need to talk about more 
than one.
Looking backwards (history) if there was a possibility to build in a backdoor such one
always had happened and had been exploited.
It applied and still applies for "most" of commercial IT software and hardware vendors
and even such OSS projects focused on securiry like openBSD (in the past).

Smart cards are good only for a certain level of privacy to keep rather primitive ciriminals away.

As long everyone is not able to audit the source code of firmware or operating systems (in particular closed source software products) there are a lot of other possibilities to steal your secrets.

I didn't follow the history of the CryptoStick until now but I would like to add my "few cents" somewhere later.

An idea would be not to trust anyone and to create so called linux live images yourself.
(saving them on a read-only medium and booting from it into live mode).
Example and some description how to do it:
http://rsync.it-infrastrukturen.org/banque-live/
http://git.it-infrastrukturen.org/banque-live.git

Due to my limited time resources all existing .iso images there are currently NOT up to date (8 months old). It is for me a time intensive challenge to patch gnupg 2.0 or the much more interesting 2.1
to support longer keys and create .deb packages with all dependencies.
(like RSA 15k .. even they are not inside "secure" standards .. from my "paranoid" point of view)

A little security is not real security. There always can be backdoors in the firmware (BIOS, closed source drivers etc).

Kind regards, Mark

--
m...@it-infrastrukturen.org

http://rsync.it-infrastrukturen.org


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to