[121689] in cryptography@c2.net mail archive
RE: "Designing and implementing malicious hardware"
daemon@ATHENA.MIT.EDU (Crawford Nathan-HMGT87)
Sat Apr 26 11:12:55 2008
Date: Fri, 25 Apr 2008 11:16:55 -0400
In-Reply-To: <874p9qlo38.fsf@snark.cb.piermont.com>
From: "Crawford Nathan-HMGT87" <HMGT87@motorola.com>
To: "Perry E. Metzger" <perry@piermont.com>, <cryptography@metzdowd.com>
I suppose Ken Thompson's, "Reflections on Trusting Trust" is appropriate
here. This kind of vulnerability has been known about for quite some
time, but did not have much relevance until the advent of ubiquitous
networking.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com