Conversation

Replying to
Big difference between a device with components that are strongly hardened, highly audited and have good ongoing security support vs. the complete opposite. Also, portraying it backwards by misinterpreting how DMA / IOMMUs work is just wrong.
1
Replying to
Devices you're talking about have entirely closed source hardware and firmware. If you choose components that are known to be insecure and also don't apply fixes to known security vulnerabilities, backdoors are a non-issue, because you have the front door wide open to attackers.
2
Replying to and
You're also once again misrepresenting closed source software as a black box. It isn't, and in fact, if you're looking for malicious, hidden backdoors, I do not really see how you're any better off trying to find them hidden in source code vs. from the final assembly code.
2
Replying to and
There is a whole compilation pipeline leading to that assembly code and all of the fancy language / compiler features, etc. are tools for the attacker to hide / generate their backdoor. Also, really, when it's full of unintentional vulnerabilities, how is any of this relevant?
1
You’re unable to view this Tweet because this account owner limits who can view their Tweets. Learn more
Replying to and
I don't think there's much of a useful conversation, and I don't agree with that take on it at all. Been going on forever from a previous mess of threads and it's clearly going nowhere and has pretty much no point. I've gotten no value from it and it's just a waste of time.
1
1