From: Michael Motyka <mmotyka@lsil.com>
To: cypherpunks@cyberpass.net
Message Hash: 1b4fded7a5145f08aee1e8a72aa4c579f277ee827e86e64dbafa08c3caa93858
Message ID: <361CEE62.3A5F@lsil.com>
Reply To: N/A
UTC Datetime: 1998-10-08 17:22:57 UTC
Raw Date: Fri, 9 Oct 1998 01:22:57 +0800
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 9 Oct 1998 01:22:57 +0800
To: cypherpunks@cyberpass.net
Subject: Re : Crypto AG: The NSA's Trojan Whore?
Message-ID: <361CEE62.3A5F@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain
J,
This stuff has been on and off the list for quite some time now. I think
the general opinion is that you cannot trust any software that does not
come with full source code. Especially operating systems ( read :
Windows ).
Furthermore, hardware could be untrustworthy.
As an example of the latter just imagine a keyboard chip that takes the
serial data signal, ANDs it with the clock and runs the current-limited
output through a metal loop on the die or couples it to an outside trace
that is not likely to be filtered. Instant keyboard transmitter. Short
range but probably usable. Try it outside the chip, I'll bet an old AM
radio will pick it up pretty well. If you have better receivers try 1x,
3x, 5x ... clock carrier frequencies.
What sort of other things would you design into an OS or a CPU or
peripheral chips if you wanted to snoop? Let the OS do the keysnoop for
you and send it off through the network? Keystrokes seem like the
obvious choice because they are low-bandwidth and have a high
information content but someone who's smarter can probably think of all
kinds of other stuff to send. ls -al > G-buddy. You know, keystrokes are
so low in bandwidth that I bet a receiver/recorder could be placed on
your premises, say behind an outlet for power, and checked
surreptitiously only when needed - how long would it take you to fill a
1Gb drive from your keyboard?
I don't think that there can be real security unless you use embedded
systems ( unknown to the OS and Host HW ) for critical roles and
maintain two machines - one clean in a cage, the other on-line and
without any sensitive information. Use sneakernet between the two using
media that you can readily analyse.
If I can think up a feasible method to do something in 5 minutes it was
probably already done a long time ago and the people who do this stuff
full-time have probably taken the field to amazing heights. They seem to
be able to get cooperation from commercial companies too.
Snooping probably won't be done wholesale, too expensive in terms of
manpower, and I don't know anyone who needs real security but, in
principle, everyone should have it.
mike
***
Crypto AG: The NSA's Trojan Whore?
http://caq.com/cryptogate
Are people familiar with this document?
Why shouldn't NSA have implanted this kind of back-doors
in various software and operating systems as well?
It seems to have worked so very well in the past.
Return to October 1998
Return to “Michael Motyka <mmotyka@lsil.com>”
1998-10-08 (Fri, 9 Oct 1998 01:22:57 +0800) - Re : Crypto AG: The NSA’s Trojan Whore? - Michael Motyka <mmotyka@lsil.com>