From: Bill Stewart <stewarts@ix.netcom.com>
To: cypherpunks@toad.com
Message Hash: 47c369c1e3854600c30c4903f83ad8db283449aa643bebfec61d11d35d59011e
Message ID: <199604270939.CAA07905@toad.com>
Reply To: N/A
UTC Datetime: 1996-04-27 12:50:53 UTC
Raw Date: Sat, 27 Apr 1996 20:50:53 +0800
From: Bill Stewart <stewarts@ix.netcom.com>
Date: Sat, 27 Apr 1996 20:50:53 +0800
To: cypherpunks@toad.com
Subject: Re: trusting the processor chip
Message-ID: <199604270939.CAA07905@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
>> By NSA standards, it is simple. NSA has probably had its own
>> semiconductor fabs for 30+ years.
>Yep. Regardless of whether the fabs are government property or not,
>it's a sure thing that some contractors have appropriately SCIFfed
>fabs and appropriately cleared staffs.
There's an interesting Moore's Law wrinkle to this. Not only
does processor speed double every 18 months, but the cost of the
chip fab plant for each generation of technology also doubles.
Intel's building some $2B plants now, and who knows what the
x886 CPU and 256MB memory fab plants will cost. While the costs
are somewhat lower for a low-volume plant than a high-volume one,
at some point it will be much harder (as a percentage of their
total budget) for the NSA to stay ahead of the power curve,
and they'll have to switch over to designs like highly-custom
applications on commercial FPGAs and such.
And "appropriately cleared staffs" are also harder to find as
the chip business internationalizes. Back when I was a tool
of the military-industrial complex, I was working on an RFP that
had a heavy-duty "buy American" policy, not only for economic
protectionism but to make sure that UnAmerican Foreigners didn't
subvert the designs for critical components to add security leaks.
For instance, the controller chips for disk drives, and raw EPROM.
We eventually got them to let us use imported commercial
products as long as any design and construction that was actually
specific to the customer was done in the US, on the assumption that
the Singaporean Espionage Service wasn't going to put back-doors in
all the disk drives their city exported, and the Korean CIA
wasn't going to put extra pins in their EPROMS that would replace
the contents with hacked versions designed to steal US Secrets :-)
# Thanks; Bill
# Bill Stewart, stewarts@ix.netcom.com, +1-415-442-2215
Return to April 1996
Return to “Bill Stewart <stewarts@ix.netcom.com>”
1996-04-27 (Sat, 27 Apr 1996 20:50:53 +0800) - Re: trusting the processor chip - Bill Stewart <stewarts@ix.netcom.com>