All the discussion the past week or two on this list regarding use of various cryptographic hardware has prompted some questions in my mind.
1) Has anyone on this list who is fluent in the microcode of any of those processors perused a copy of the source microcode for any of them that have been discussed here? That question, of course, leads to 2) If the answer to 1) is yes, can that person or persons give us an assessment of the risk of any back doors being present in any of those processors? Scott Bennett, Comm. ASMELG, CFIAG ********************************************************************** * Internet: bennett at cs.niu.edu * *--------------------------------------------------------------------* * "A well regulated and disciplined militia, is at all times a good * * objection to the introduction of that bane of all free governments * * -- a standing army." * * -- Gov. John Hancock, New York Journal, 28 January 1790 * ********************************************************************** *********************************************************************** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/