"Designing and implementing malicious hardware"

Crawford Nathan-HMGT87 HMGT87 at motorola.com
Fri Apr 25 11:16:55 EDT 2008


I suppose Ken Thompson's, "Reflections on Trusting Trust" is appropriate
here.  This kind of vulnerability has been known about for quite some
time, but did not have much relevance until the advent of ubiquitous
networking.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list