1 |
Adam Carter wrote: |
2 |
> On Tue, Dec 11, 2018 at 7:49 PM Neil Bothwick <neil@××××××××××.uk |
3 |
> <mailto:neil@××××××××××.uk>> wrote: |
4 |
> |
5 |
> > So tell us what is your perfect country for hardware manufacturing? |
6 |
> |
7 |
> There isn't one as you can never be sure. You are presenting hope, and |
8 |
> maybe likelihood, as certainty when this does not exist. |
9 |
> |
10 |
> |
11 |
> Datapoint - looks like Bloomberg is starting to walk back its complete |
12 |
> support of the original implant story. |
13 |
> https://www.bloomberg.com/news/articles/2018-12-11/super-micro-says-third-party-test-found-no-malicious-hardware |
14 |
> |
15 |
> Also they have assigned another reporter that was not involved in the |
16 |
> original story, to attempt to verify the claims of the original story... |
17 |
> |
18 |
> Others have made the point that the Amazon and Apple denials left them |
19 |
> no wriggle room in the event that implants are found and shareholders |
20 |
> launch a class action, and that this indicates a genuine belief that |
21 |
> there are no backdoors. |
22 |
> |
23 |
> Considering risk; |
24 |
> If you are of interest to a nation state, you're pretty much stuffed |
25 |
> anyway, and I think this discussion has been around implants made via |
26 |
> Chinese government action. |
27 |
> The management processor issue is a real problem because they're not |
28 |
> well understood, on by default, cant be (or cant easily) be disabled, |
29 |
> and has to be software maintained. However, given all the other issues |
30 |
> like the never ending stream of security issues in software, i'm not |
31 |
> sure it changes the overall risk profile significantly. Only time will |
32 |
> tell. |
33 |
> |
34 |
> Sorry for further polluting your thread Dale :) |
35 |
> |
36 |
|
37 |
|
38 |
I agree. If you are committing international crimes, terrorism for |
39 |
example, they will snoop on you and it doesn't matter much what you do |
40 |
or use. If nothing else, they will put you on a super computer setup |
41 |
that will crack whatever you are doing/using and get you that way. As |
42 |
we know, generally speaking, given enough computer power, almost |
43 |
anything can be cracked. It's a time thing mostly. |
44 |
|
45 |
While off topic sort of, it is still relevant. This might fit better on |
46 |
the encryption thread but I still find it interesting. It is technology |
47 |
related too. It seems we agree on one thing here, we can't trust much |
48 |
of anything or anyone completely. So, no need for the apology. I still |
49 |
learn from the posts even if I don't post a reply to some. |
50 |
|
51 |
Dale |
52 |
|
53 |
:-) :-) |