Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It could be designed that doing so will generate some alarm to other people. For example, the backdoor do not exists and it has to be developed, so the attacker has to keep them hostage for some period of time and loved ones may report a missing person. The software then might have to be signed with a key that generate alert to the whole engineering team, which someone else in the company may investigate the unauthorized release as cyberattack. Perhaps the release signing key is physically stored in the office (eg. Yubikey) which also require the attacker to perform a heist in the office.

Surely some three letters organization probably could pull that off, but it add risk to their operation that the operation could be leaked.



Surely some three letters organization probably could pull that off, but it add risk to their operation that the operation could be leaked.

This is basically a point I've made in a few of my talks about security and cryptography: The point of cryptography isn't to guarantee that your data is safe; it's to raise the cost of an attack to the point where a potential attacker decides not to attack. In particular, there's usually a human involved somewhere (sending or receiving information, or both) and humans are squishy and fragile; but torturing people attracts far more adverse attention than torturing data.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: