No, no, no.
The back door can be a *very* subtle ordering of code that lets TLAs
do things like analyze the running program to perform "timing
analysis" attacks to leach out bit of the key. That, in turn lets
the TLA more easily perform brute-force attacks.
Read this message:
http://article.gmane.org/gmane.os.openbsd.tech/22559
On 12/15/2010 12:27 PM, Alex Levy wrote:
> Wait wouldn't such a code have been brought to light years ago? Being that
> the program(s) are/is open source, you have access to the source code right?
> So know one was like "hey what the hell is this extra stuff in here?"
>
> On Wed, Dec 15, 2010 at 11:19 AM, B. Estrade<estrabd@gmail.com> wrote:
>
>> Here's the thread of the message mentioned in the OP.
>>
>> http://thread.gmane.org/gmane.os.openbsd.tech/22557
>>
>> Brett
>>
>> On Wed, Dec 15, 2010 at 09:19:33AM -0600, Joey Kelly wrote:
>>
>> <ot snipped>
>>>
-- Seek truth from facts. ___________________ Nolug mailing list nolug@nolug.orgReceived on 12/15/10
This archive was generated by hypermail 2.2.0 : 12/15/10 EST