1996-04-28 - Re: trusting the processor chip

Header Data

From: Snow <snow@crash.suba.com>
To: cypherpunks@toad.com
Message Hash: 5cca48b522f2c8a579df5eefbb2d1734cbbfdaa0a67fe455cfd1172993975cc8
Message ID: <Pine.LNX.3.91.960427220258.1445B-100000@crash.suba.com>
Reply To: <m0uCiBa-00094jC@pacifier.com>
UTC Datetime: 1996-04-28 08:13:50 UTC
Raw Date: Sun, 28 Apr 1996 16:13:50 +0800

Raw message

From: Snow <snow@crash.suba.com>
Date: Sun, 28 Apr 1996 16:13:50 +0800
To: cypherpunks@toad.com
Subject: Re: trusting the processor chip
In-Reply-To: <m0uCiBa-00094jC@pacifier.com>
Message-ID: <Pine.LNX.3.91.960427220258.1445B-100000@crash.suba.com>
MIME-Version: 1.0
Content-Type: text/plain


On Fri, 26 Apr 1996, jim bell wrote:
[...]
> and will be very hard to separate.  If it is possible to replace a keyboard 
> chip with a Trojan Horse, the one desired target will be far more identifiable.

	Why go thru all the hassle when software would be easier? Or a 
very small camera placed in the ceiling watching the keyboard? 

	It would seem to me that building a hacked chip that did 
_everything_ that the original did plus would be a lot more difficult 
(think Fab Plants, tool up costs, engineering) than just faking an alien 
abduction...


Petro, Christopher C.
petro@suba.com <prefered>
snow@crash.suba.com





Thread