On Fri, Jan 30, 2009 at 1:41 PM, Jonathan Thornburg
<[email protected]> wrote:
> For open-source software encryption (be it swap-space, file-system,
> and/or full-disk), the answer is "yes":  I can assess the developers'
> reputations, I can read the source code, and/or I can take note of
> what other people say who've read the source code.

Really? What about hardware backdoors? I'm thinking something like the
old /bin/login backdoor that had compiler support, but in hardware.

-- 
Taral <[email protected]>
"Please let me know if there's any further trouble I can give you."
    -- Unknown

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [email protected]

Reply via email to