On (2013-12-31 14:45 +0100), sthaug@nethelp.no wrote:
This whole backdoor business is a very, very, dangerous game.
It *is* a big deal. And if you want to get even more scared, listen to Jacob Appelbaum's talk at the CCC here:
I'm going to wait calmly for some of the examples being recovered from the field, documented and analysed. I'd love to see for example the pwned Juniper code in action, how do they manage from BIOS to inspect data from HW path, without relying on specific version of FreeBSD, JunOS, control-plane, HW NPU/ASIC. What is it capable of doing, what is it not capable of doing. How does it deliver the data. As they are presented as pervasive and common, I'm sure it's just matter of time when we'll have higher quality of data than screencapture of PDF. -- ++ytti, Commander, FUSAG