Re: [cryptography] evidence for threat modelling -- street-sold hardware has been compromised

2013-07-31 Thread ianG

On 31/07/13 03:52 AM, Peter Gutmann wrote:

Marcus Brinkmann marcus.brinkm...@ruhr-uni-bochum.de writes:


If you trust anonymous leaks to the Financial Review by members of your
favourite spying agency network, then I guess its evidence.


More importantly, look at the dates:

   The ban was introduced in the mid-2000s after intensive laboratory testing
   of its equipment allegedly documented 'back-door' hardware and 'firmware'
   vulnerabilities in Lenovo chips.

In the mid-2000's, Lenovo PCs were still IBM Thinkpads (the sale to Lenovo
happened in 2005).  ZOMG!  IBM backdoored them, not the Chinese!  And to think
that they've always been the most patriotic of computer manufacturers (Watson
turned IBM over to the USG in both WWI and WWII).  It was all a trick!



On IBM's watch, right.  But the Thinkpads were manufactured by Lenova in 
China well before that;  what IBM sold was the franchise  rights.


Did they discover, as did google, that they had lost control of the 
situation, and easing out was the better deal?




So either the analysis found completely normal design features in IBM parts,
or it's the usual USG paranoia about the Chinese.  Yawn.  Next story about the
Yellow Peril due in six to eight weeks.  Lather, rinse, repeat.



It's definitely a Yellow Peril story, as well as whatever else it might 
be.  Some context:


This came out of Australia.  There (from memory) the government has 
embarked on the project to get 93% of all homes connected with fiber. 
This is the biggest infra project ever financed by the government in AU, 
and is a political make-or-break deal.  It's big enough to topple the 
government, and the price is big enough to move the government from 
safest in the world into budget impaired land [0].


The opposition is making a lot of hay over the fiber project. 
Especially, as their #2 man is an Internet ISP squillionaire, and he is 
tech  business competent.


Here's the crux:  *The government banned Huawai out of the backbone 
work*.  Huawai hasn't taken this lying down, and has cozied up to the 
opposition.


So the revelations about Lenova are being clearly created to protect 
this situation.  They are not lightly made, these are 
politically-instructed leaks.  I'd suggest that the claims made to AFR 
as leaks had better be true  reliable, otherwise the leaks are going 
to effect the government's credibility in the overall scheme of things.




iang



[0] Especially, note that the economy of AU is driven by mining which is 
driven by China.  As China stalls, so does AU, and its super-clean wot 
crisis? reputation slips into the mud.  Poignant...




Peter.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography



___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] evidence for threat modelling -- street-sold hardware has been compromised

2013-07-31 Thread grarpamp
 On IBM's watch, right.  But the Thinkpads were manufactured by Lenova in
 China well before that;  what IBM sold was the franchise  rights.

And so where does Cisco and Juniper gear come from again... ?
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] evidence for threat modelling -- street-sold hardware has been compromised

2013-07-31 Thread ianG

On 31/07/13 11:46 AM, grarpamp wrote:

On IBM's watch, right.  But the Thinkpads were manufactured by Lenova in
China well before that;  what IBM sold was the franchise  rights.


And so where does Cisco and Juniper gear come from again... ?



Indeed.  Methinks the Australian pollies have been seduced by the 
industrial-military-cyber complex, yet again.  They have good track 
record.  The real answer at the core of this is that old saw:  follow 
the money.




iang
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] evidence for threat modelling -- street-sold hardware has been compromised

2013-07-31 Thread Lodewijk andré de la porte
2013/7/31 grarpamp grarp...@gmail.com

 And so where does Cisco and Juniper gear come from again... ?


Let's not argue about whether Taiwan is China or The People's Republic of
China is China ;)

They do use foxxcon, but it's not clear whatfor. I can imagine they use
foxconn for non-sensitive things. (Like European electronics hahaha).

And they might've moved production in 2000. Or used parts from China.

Regardless of this being rumor mongering, I'm pretty sure the Chinese are
exploiting, backdooring, etc. anything they can.

reg. Australia, of course there's massive amounts of wink-wink going on in
that contract. I hope they give it to a domestic company, like every
government should do. Especially not give it to those contract hungry
Chinese semi-communist central planning extended government
monopolistcorps. Huawei can suck it.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] evidence for threat modelling -- street-sold hardware has been compromised

2013-07-31 Thread Sandy Harris
grarpamp grarp...@gmail.com wrote:

 And so where does Cisco and Juniper gear come from again... ?

Cisco has factories in China, in at least Suzhou  Hefei. They
also have RD centers in at least Shanghai  Hefei:
http://cisco-news.tmcnet.com/news/2011/11/25/5954051.htm
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] http://goldbug.sourceforge.net/ - Secure Instant Messenger

2013-07-31 Thread Randolph D.
Did any one looked into this
http://goldbug.sourceforge.net/
Secure Instant Messenger
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography