All the discussion the past week or two on this list regarding use of
various cryptographic hardware has prompted some questions in my mind.

        1) Has anyone on this list who is fluent in the microcode of any
        of those processors perused a copy of the source microcode for any
        of them that have been discussed here?

That question, of course, leads to

        2) If the answer to 1) is yes, can that person or persons give us
        an assessment of the risk of any back doors being present in any
        of those processors?


                                  Scott Bennett, Comm. ASMELG, CFIAG
**********************************************************************
* Internet:       bennett at cs.niu.edu                              *
*--------------------------------------------------------------------*
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."                                               *
*    -- Gov. John Hancock, New York Journal, 28 January 1790         *
**********************************************************************
***********************************************************************
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

Reply via email to