Conversation

Replying to
Big difference between a device with components that are strongly hardened, highly audited and have good ongoing security support vs. the complete opposite. Also, portraying it backwards by misinterpreting how DMA / IOMMUs work is just wrong.
1
Replying to
Devices you're talking about have entirely closed source hardware and firmware. If you choose components that are known to be insecure and also don't apply fixes to known security vulnerabilities, backdoors are a non-issue, because you have the front door wide open to attackers.
2
Replying to and
You're also once again misrepresenting closed source software as a black box. It isn't, and in fact, if you're looking for malicious, hidden backdoors, I do not really see how you're any better off trying to find them hidden in source code vs. from the final assembly code.
2
Replying to and
Why are you okay with using the Linux kernel when it's full of remote and local code execution backdoors? You talk about theoretical backdoors when there are real, unintentional (supposedly) backdoors called vulnerabilities which you don't seem in a rush to get fixed...
1
1
You’re unable to view this Tweet because this account owner limits who can view their Tweets. Learn more
Show replies