In article <[EMAIL PROTECTED]>,
Frank Knobbe  <[EMAIL PROTECTED]> wrote:
> PS: If the conspiracy theory is correct and Microsoft *had* to
> include an NSA back door key, who says Checkpoint and Sun and HP and
> RedHat and NAI and Axent, etc, didn't have to include one as well???

I can't say anything about the others, but to get a backdoor into Red Hat
or any other free UNIX (Linux or BSD) would involve compromising the FSF
and the vendor, because unless it was hidden in some sort of Thompsonesque
doubly-hacked GCC code, it'd be found in the source.

I guess to be sure you can compile GCC on some third-party UNIX with the native
compiler, and use that to cross-compile GCC and libraries for the target, to
make sure there's no chain of binaries that could transmit the hack.

If you're feeling paranoid, that is.

-- 
In hoc signo hack, Peter da Silva <[EMAIL PROTECTED]>
 `-_-'   Ar rug t� barr�g ar do mhact�re inniu? 
  'U`    << <KH> you did technical support for Hell ?
            <susan> Didn't we all, in our youth? >:) >>
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to