On Fri, Jan 30, 2009 at 1:41 PM, Jonathan Thornburg <[email protected]> wrote: > For open-source software encryption (be it swap-space, file-system, > and/or full-disk), the answer is "yes": I can assess the developers' > reputations, I can read the source code, and/or I can take note of > what other people say who've read the source code.
Really? What about hardware backdoors? I'm thinking something like the old /bin/login backdoor that had compiler support, but in hardware. -- Taral <[email protected]> "Please let me know if there's any further trouble I can give you." -- Unknown --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [email protected]
