tag:blogger.com,1999:blog-4088979.post1603888960892219279..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Bruce Schneier, Cyber Warrior?Richard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-4088979.post-26380008823419926722010-12-06T19:08:36.319-05:002010-12-06T19:08:36.319-05:00Allowing someone do your key management crypto sof...Allowing someone do your key management crypto software and not being able to validate that would be the equivalent of asking someone whom you dont trust to build a lock and give you a key and store all your valuables behind that :-)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-33777263377887157002010-12-05T04:19:19.217-05:002010-12-05T04:19:19.217-05:00The military institution which is my employer only...The military institution which is my employer only is allowed to buy US based manufacturers ... Ironically, every single Cisco box is labelled "made in china" and Apple computers are labelled assembled in China"<br /><br />In today's world what's the difference ? Can an ISP, in this economical climate and competition be blamed ?<br /><br />ninja edit: just for the record: Alcatel-Lucent is also in bed with China so that's not an alternativeMe, Davidnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-44932359210979568692010-12-04T09:27:00.174-05:002010-12-04T09:27:00.174-05:00Conspiracy theories abound....
Crypto AG was at t...Conspiracy theories abound....<br /><br />Crypto AG was at the center stage when it was accused of building back doors for Intelligence agencies when it shipped cryptographic equipment to other countries.<br /><br />http://en.wikipedia.org/wiki/Crypto_AG<br /><br />Similarly what prevents governments from discovering and keeping vulnerabilities (later back doors) to themselves when they have the source code of OS (including Windows). Nothing can be hidden given enough resources.<br /><br />Microsoft opens source code to Russian secret service<br /><br />http://www.zdnet.co.uk/news/security/2010/07/08/microsoft-opens-source-code-to-russian-secret-service-40089481/<br /><br />they have done similar arrangements with China in the past.<br /><br />Huawei, Cisco Juniper everyone runs an OS (a piece of software) thats vulnerable and available to adversaries.Nasir Khanhttps://www.blogger.com/profile/03489532814246060366noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-88508427367164857142010-12-04T03:00:38.891-05:002010-12-04T03:00:38.891-05:00A small mind game.
The network was probably most...A small mind game. <br /><br />The network was probably mostly up and running and replacing it is very expensive. BT does not care about a potential cyber warfare problem, if the price for protection is maybe 20b (nonHuawei price). But the government might be willing to pay. If persuaded. <br />Although in this case I do not believe mr Schneier was able to be that cynical. <br /><br />In Estonia IMHO the cyber warface is being used to get government to pay the salary (and equipment) for banks and a little less for telcos security needs. <br />They now even have mpa degree in cyber security.<br />Now, if we think about things from this perspective...<br />Its just money. <br /><br />This does not mean that I think that the problems are so black and white. It all comes to responsibility and in case of problems who in reality will take the bill. <br /><br />JuhaniAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-64265969757495817932010-12-03T22:22:21.956-05:002010-12-03T22:22:21.956-05:00It should also be pointed out that foreign countri...It should also be pointed out that foreign countries using equipment made by US companies should fear that the US government could have backdoors allowing them to affect critical systems.<br /><br />And have already done so, such as the Russian gas pipeline incident and numerous rumours about NSA hooks into various products.Anonymousnoreply@blogger.com