On Sat, Apr 26, 2008 at 02:33:11AM -0400, Karsten Nohl wrote: [...] > Assuming that hardware backdoors can be build, the interesting question > becomes how to defeat against them. Even after a particular triggering > string is identified, it is not clear whether software can be used to > detect malicious programs. It almost appears as if the processor would > need a hardware-based virus-scanner or sorts. This scanner could be > simple as it only has to match known signatures, but would need have > access to a large number of internal data structures while being > developed by a completely separate team of designers.
Wouldn't it be fun to assume that these are already present in all sorts of devices? -- - Adam ** Expert Technical Project and Business Management **** System Performance Analysis and Architecture ****** [ http://www.adamfields.com ] [ http://www.morningside-analytics.com ] .. Latest Venture [ http://www.confabb.com ] ................ Founder [ http://www.aquick.org/blog ] ............ Blog [ http://www.adamfields.com/resume.html ].. Experience [ http://www.flickr.com/photos/fields ] ... Photos [ http://www.aquicki.com/wiki ].............Wiki --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]