[3109] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Intel's "own back-door processes"?

daemon@ATHENA.MIT.EDU (John Young)
Tue Jul 28 14:06:11 1998

Date: Tue, 28 Jul 1998 12:49:44 -0400
To: "Richard D. Murad" <richard.murad@trw.com>
From: John Young <jya@pipeline.com>
Cc: cryptography@c2.net
In-Reply-To: <3.0.5.32.19980728091325.007fb810@gisdbbs.gisd.trw.com>

Richard Murad wrote:

>Does anybody know what is being referred to by Intel's "own back-door
>processes"?

This may refer to Intel/Mircrosoft's "Wired for Management" products which
allows pre-OS-boot access to computers to covertly monitor usage. There
are links to these products and descriptions of snooping features being 
developed by others to to meet market demand at:

   http://jya.com/gak-de.htm

Netscape, IBM, HP and a host of others are marketing similar products,
and there are others who will sell their invasive inventions, such as DIRT,
only to law enforcement (a claim made apparently to boost illusions of 
lethality).

The business of countering these devices is proceeding equally well.

Today, DoD released a speech on infosec and encryption given to a 
gathering of Fortune 500 CIOs, some of whom bluntly challenged the 
government's restriction on strong crypto -- which DoD believes is the
primary means of protection, but waffles on the squabble between
commerce and law enforcement:

   http://jya.com/dod072198.htm




home help back first fref pref prev next nref lref last post