[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: trusting the processor chip



At 10:50 AM 4/26/96 -0500, Rick Smith wrote:
>Having penned the response to Jeffrey Flinn on the unlikelihood of
>processor back doors, I'll comment on jim bell's response:

>> More likely,I think, an organization like the NSA 
>>might build a pin-compatible version of an existing, commonly-used product 
>>like a keyboard encoder chip that is designed to transmit (by RFI signals) 
>>the contents of what is typed at the keyboard.  It's simple, it's hard to 
>>detect, and it gets what they want.
>
>Simple, no.

By NSA standards, it is simple.  NSA has probably had its own semiconductor 
fabs for 30+ years.  Even if we assume that their capabilities lag 
commercial production in terms of density or quality, keyboard encoder chips 
were trivial 20+ years ago and could presumably be easily 
duplicated/modified today by even the oldest operating fabs.  They probably 
had far less than 10,000 transistors.  Even modern keyboard controllers 
probably "waste"  a microcontroller with far more capability than you'd need 
for the task, and microcontrollers usually have substantially more code area 
than would be necessary to add some sort of surreptitious function.

>Hard to detect, somewhat.

You'd have to know what to look for.


>Gets what they want, unclear.

If there was one single data stream you'd like to get, it's the keyboard.  
This doesn't get you everything, but close.