top | item 45518830

(no title)

hackernewsdhsu | 4 months ago

A backdoored device can transmit secure comms, if the encryption is performed on a protected device.

discuss

order

Aachen|4 months ago

I've read up on this in the context of potentially backdoored CPUs and there is fundamentally no way. You don't need to trust the router (as you say: a device that just relays data can have all the backdoors you want, thanks to asymmetric cryptography enabling E2EE), but the scenario is that your own device has software from law enforcement on it

In which case, the best you can do is use an obscure method that the attacker is unprepared for. If they've hijacked the AES CPU operation to store the key and include it in the output for a later syscall like when writing the output file, but you unexpectedly use some funky experimental cipher, you'd be lucky until they push an update. The device has a mandatory backdoor after all, so govt can also decide what new code it needs to run now, perhaps under the guise of detecting more situations of terroristic content or whatnot. There's no winning that game except through obscurity, and I presume everyone has heard about how reliable security through obscurity is

quotemstr|4 months ago

He's referring to doing something like using a compromised device to take a photograph of the ciphertext made on a different device or something like that.