On Wed, May 02, 2007 at 06:12:31PM +0100, Dave Korn wrote:
> If you wanted to be /really/ certain, I guess you'd have to take the tops
> off all the ICs inside and look at them under an EM, to make sure they really
> were the parts they claimed to be and don't have any extra circuitry or hidden
>
Hello,
On 02/05/07 20:12, Dave Korn wrote:
> Interesting, but of course they're still a good way from 100% secure. It's
> really great that they issue the source, but unless they also issue the
> toolchain, and the source to the toolchain, so that anyone who wants can
> recompile and reflash th
On 02 May 2007 16:16, Ali, Saqib wrote:
> A notable mention is http://www.cryptophone.com/ . They are the only
> secure phone provider that allows for independent review of the source
> code.
Interesting, but of course they're still a good way from 100% secure. It's
really great that they issu
A notable mention is http://www.cryptophone.com/ . They are the only
secure phone provider that allows for independent review of the source
code.
On 4/30/07, Steven M. Bellovin <[EMAIL PROTECTED]> wrote:
According to an NY Times article
(http://news.com.com/Phone+taps+in+Italy+spur+rush+toward+e
According to an NY Times article
(http://news.com.com/Phone+taps+in+Italy+spur+rush+toward+encryption/2100-1029_3-6180118.html?tag=nefd.top),
phone encryption technology is becoming popular in Italy because of
many recent incidents of conversations being published. Sometimes, a
wiretap is being le