Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>Convincing Intel or AMD to have a hidden back door, and to somehow keep that it hidden, is a nearly impossible task

Interesting, how would an X86 instruction with hardcoded 256-bit key would be detected? IIRC it's really hard to audit the instruction space for CISC architecture.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: