[121689] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: "Designing and implementing malicious hardware"

daemon@ATHENA.MIT.EDU (Crawford Nathan-HMGT87)
Sat Apr 26 11:12:55 2008

Date: Fri, 25 Apr 2008 11:16:55 -0400
In-Reply-To: <874p9qlo38.fsf@snark.cb.piermont.com>
From: "Crawford Nathan-HMGT87" <HMGT87@motorola.com>
To: "Perry E. Metzger" <perry@piermont.com>, <cryptography@metzdowd.com>

I suppose Ken Thompson's, "Reflections on Trusting Trust" is appropriate
here.  This kind of vulnerability has been known about for quite some
time, but did not have much relevance until the advent of ubiquitous
networking.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post