Again it is very unlikely. There are many options
to get the keys - like forcing you to divulge them or wire tapping your
keyboard. If such a backdoor was included than it
would likely be spotted. Here are some comments on a similar accusation a few
years ago: http://www.cnn.com/TECH/computing/9909/13/backdoor.idg/ From:
owner-or-talk@xxxxxxxxxxxxx [mailto:owner-or-talk@xxxxxxxxxxxxx] On Behalf Of Ringo Kamens I'm not saying the AES is
weak. I'm saying that Microsoft might have implemented a back-door for
governments. They could store the private keys and passwords in videocard
memory or in the boot sector or something like that. On 5/14/06, Tony
<Tony@xxxxxxxxxxxxx> wrote:
2. The restrictions on encryption were removed some years
ago. The best encryption software comes from outside the Unless a vulnerability is found in 256 bit AES it would take
them longer than the ages of the universe to crack a key by brute force no
matter how many terraflops of power they have to task on your key (not to
mention the many others they might want to crack) 3. Filtering content is not quite the same as signing code
and pretending it comes from Microsoft. Such a piece of code would have a
changed checksum would likely be spotted and then analysed. I can't see
Microsoft doing that unless required by law. 4. TPM is part of the trusted computing concept. It just
makes it much harder. Not impossible. From: owner-or-talk@xxxxxxxxxxxxx
[mailto:owner-or-talk@xxxxxxxxxxxxx]
On Behalf Of Ringo Kamens
There are
a few key points that you are overlooking. 1. In
support of the photocopying money scandal, most printers have yellow dots
imprinted on them that track date printed, serial number, etc. 2. By 3. How can
you honestly think Microsoft wouldn't bend over for the 4. In
terms of using checksums to ensure your system hasn't been tampered with, the
computer hardware could have a defense system against that such as trusted
computing. Ringo
Kamens On
5/14/06, Mike Zanker < mike@xxxxxxxxxx> wrote: On
14/5/06 15:10, Tony wrote: |