Home > slashdot > Can You Trust Chinese Computer Equipment?

Can You Trust Chinese Computer Equipment?

February 5th, 2010 02:02 admin Leave a comment Go to comments

Ian Lamont writes “Suspicions about China slipping eavesdropping technology into computer exports have been around for years. But the recent spying attacks, attributed to China, on Google and other Internet companies have revived the hardware spying concerns. An IT World blogger suggests the gear can’t be trusted, noting that it wouldn’t be hard to add security holes to the firmware of Chinese-made USB memory sticks, computers, hard drives, and cameras. He also implies that running automatic checks for data of interest in the compromised gear would not be difficult.” The blog post mentions Ken Thompson’s admission in 1983 that he had put a backdoor into the Unix C compiler; he laid out the details in the 1983 Turing Award lecture, Reflections On Trusting Trust: “The moral is obvious. You can’t trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect.”

Source: Can You Trust Chinese Computer Equipment?

Related Articles:

  1. Mozilla Debates Whether To Trust Chinese CA
  2. Chinese Spying Devices Installed On Hong Kong Cars
  3. Chinese Man Gets 30 Years For Fake Cisco Sales
  4. Chinese Man Gets 30 Months For Fake Cisco Sales
  5. Several Western Govts. Ban Lenovo Equipment From Sensitive Networks
blog comments powered by Disqus