Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Sat, 2 Mar 2002 13:19:21 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Sat, 2 Mar 2002 13:19:14 -0500 Received: from lightning.swansea.linux.org.uk ([194.168.151.1]:50706 "EHLO the-village.bc.nu") by vger.kernel.org with ESMTP id ; Sat, 2 Mar 2002 13:19:05 -0500 Subject: Re: SSSCA: We're in trouble now To: neale@lowendale.com.au (Neale Banks) Date: Sat, 2 Mar 2002 18:32:45 +0000 (GMT) Cc: alan@lxorguk.ukuu.org.uk (Alan Cox), spstarr@sh0n.net (Shawn Starr), xavier.bestel@free.fr (Xavier Bestel), pgallen@randomlogic.com (Paul G. Allen), linux-kernel@vger.kernel.org (Linux Kernel Mailing List) In-Reply-To: from "Neale Banks" at Mar 02, 2002 02:08:34 PM X-Mailer: ELM [version 2.5 PL6] MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-Id: From: Alan Cox Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org > > It has no control over the BIOS and SMM code. Who knows what is going on > > behind the scenes in the BIOS, be it for intentional or more dubious > > purposes. > > All too true. However, given the quality of BIOS code we have seen over > the years, the thought of your average BIOS programmer implementing > cryptographic techniques does provide some amusement ;-) I trust several government agencies to be able to supply very high quality SMM bios code through a person planted in one of the bios writing houses. Trusted computing people take this kind of stuff very seriously - and for good reason. Alan - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/