zlacker

[parent] [thread] 2 comments
1. brbsix+(OP)[view] [source] 2016-04-09 04:56:27
That custom run you've described sounds like exactly the sort of "interesting" order I'd like to intercept and backdoor (as part of NSA's TAO or some other yet unnamed organization).

Personally I'd prefer to buy off-the-shelf hardware and just snip the mic and camera.

replies(1): >>rdl+q2
2. rdl+q2[view] [source] 2016-04-09 05:57:52
>>brbsix+(OP)
Yes, but there are solutions to this (cut-and-choose, published specs, etc.)
replies(1): >>throwa+1b
◧◩
3. throwa+1b[view] [source] [discussion] 2016-04-09 09:59:51
>>rdl+q2
> cut-and-choose

So, OEM buys 10k units, chooses a few samples and tests them. Then he sends all the units on to his logistics warehouse to fulfill customer orders. The shipment from the testing facility to the warehouse is an interesting target now. Alternatively, the outgoing orders from that logistics warehouse.

An induvidual customer buying one laptop is no closer to his goal of ensuring no outside party tampered with it.

> published specs

I'm curious how published specs help a regular user verify his laptop does not contain manufacturing backdoors.

I've seen many suggestions for hardware integrity, but none of them enables the end user to verify that his hardware exactly matches with the published schematics/ASIC masks. They all simplify the problem description to only reach part of the way, requiring trust on part of the end user in all the later links in the chain. Or they just assume that the customer is buying 10k units - which does nothing to help individual end-users.

[go to top]