Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Unless, of course, you're hardware has been backdoor-ed when it was created (or do you trust all hardware manufacturers, including those in China under potential pressure from government...). See for example King et al. on "Designing and implementing malicious hardware", online version appears to be here: http://www.usenix.org/event/leet08/tech/full_papers/king/kin...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: