Conversation

Replying to
Big difference between a device with components that are strongly hardened, highly audited and have good ongoing security support vs. the complete opposite. Also, portraying it backwards by misinterpreting how DMA / IOMMUs work is just wrong.
1
Replying to
Devices you're talking about have entirely closed source hardware and firmware. If you choose components that are known to be insecure and also don't apply fixes to known security vulnerabilities, backdoors are a non-issue, because you have the front door wide open to attackers.
2
Replying to and
There is a whole compilation pipeline leading to that assembly code and all of the fancy language / compiler features, etc. are tools for the attacker to hide / generate their backdoor. Also, really, when it's full of unintentional vulnerabilities, how is any of this relevant?
1
Replying to and
Why are you okay with using the Linux kernel when it's full of remote and local code execution backdoors? You talk about theoretical backdoors when there are real, unintentional (supposedly) backdoors called vulnerabilities which you don't seem in a rush to get fixed...
1
1
Replying to
I want a future where I don't need to any closed code, and then rip out unauditable open code until the OS is something super lean and capable of being reviewed/trusted by the community. Maybe this takes a decade. Long term I feel we are screwed without this option existing.
1
Replying to
Auditing doesn't magically uncover all vulnerabilities, and you're talking about a vulnerability that was intentionally inserted and designed to be hidden, which means whoever did it had the opportunity to use all available tools to keep it concealed. They might actually be quite
2
Show replies