Mike Dilger ☑️ on Nostr: The easiest place for a backdoor to be injected is at the chip fab, after a chip is ...
The easiest place for a backdoor to be injected is at the chip fab, after a chip is designed and taped out, before it is written to silicon. Several of these have been detected via electron scanning microscopes, so it does happen. But IMHO it probably doesn't happen to most chips. In commercial processors it can happen at the design level.
People can't produce fast hardware via open-source projects. But they can burn a circuit into an FPGA and be pretty sure there are no backdoors, but they end up with something really slow.
My thinking was "the most likely commercially available fast processors to not be backdoored would be new ones in new areas of technology".
Just because I think Intel and AMD chips have backdoors (sandsifter found hidden RISC instructions that bypass security, RDRAND acted strangely, Intel ME is pretty well known, etc) doesn't mean that the intelligence community is successfully backdooring even the early research projects. I suspect they aren't, but of course I don't know. Hitting the big commercial projects is a big win for them, but hitting every little research project is a huge cost with very little benefit.
Published at
2024-05-12 23:21:02Event JSON
{
"id": "9bc3bb26f9900c4e95ca8e5a01c0a44860028bf8f78707553b570195e7291e98",
"pubkey": "ee11a5dff40c19a555f41fe42b48f00e618c91225622ae37b6c2bb67b76c4e49",
"created_at": 1715556062,
"kind": 1,
"tags": [
[
"p",
"ac29cd81a328f183ca1ed3b4349f695747098ceb938964fdb51264e86ebbaa27"
],
[
"e",
"0455983e9fb9b335dd8029d3a539fc02e3727af30d5ea6cb257e422aecf3af13",
"wss://chorus.mikedilger.com:444/",
"root"
],
[
"e",
"5fda92c7336cdc6a242d23ce9ab3d49ddf6d713967ec02394fa1b54d4510a029",
"wss://a.nos.lol/",
"reply"
]
],
"content": "The easiest place for a backdoor to be injected is at the chip fab, after a chip is designed and taped out, before it is written to silicon. Several of these have been detected via electron scanning microscopes, so it does happen. But IMHO it probably doesn't happen to most chips. In commercial processors it can happen at the design level.\n\nPeople can't produce fast hardware via open-source projects. But they can burn a circuit into an FPGA and be pretty sure there are no backdoors, but they end up with something really slow.\n\nMy thinking was \"the most likely commercially available fast processors to not be backdoored would be new ones in new areas of technology\".\n\nJust because I think Intel and AMD chips have backdoors (sandsifter found hidden RISC instructions that bypass security, RDRAND acted strangely, Intel ME is pretty well known, etc) doesn't mean that the intelligence community is successfully backdooring even the early research projects. I suspect they aren't, but of course I don't know. Hitting the big commercial projects is a big win for them, but hitting every little research project is a huge cost with very little benefit.",
"sig": "489636c85c3abaf2dfcbe7cefc2445c56af5acfa973b71fc8a80c39c68064d0d091645510d0c459bd23b2468bb802afd900d75055740d2eca8deb5da9fa93af5"
}