[3109] in cryptography@c2.net mail archive
Re: Intel's "own back-door processes"?
daemon@ATHENA.MIT.EDU (John Young)
Tue Jul 28 14:06:11 1998
Date: Tue, 28 Jul 1998 12:49:44 -0400
To: "Richard D. Murad" <richard.murad@trw.com>
From: John Young <jya@pipeline.com>
Cc: cryptography@c2.net
In-Reply-To: <3.0.5.32.19980728091325.007fb810@gisdbbs.gisd.trw.com>
Richard Murad wrote:
>Does anybody know what is being referred to by Intel's "own back-door
>processes"?
This may refer to Intel/Mircrosoft's "Wired for Management" products which
allows pre-OS-boot access to computers to covertly monitor usage. There
are links to these products and descriptions of snooping features being
developed by others to to meet market demand at:
http://jya.com/gak-de.htm
Netscape, IBM, HP and a host of others are marketing similar products,
and there are others who will sell their invasive inventions, such as DIRT,
only to law enforcement (a claim made apparently to boost illusions of
lethality).
The business of countering these devices is proceeding equally well.
Today, DoD released a speech on infosec and encryption given to a
gathering of Fortune 500 CIOs, some of whom bluntly challenged the
government's restriction on strong crypto -- which DoD believes is the
primary means of protection, but waffles on the squabble between
commerce and law enforcement:
http://jya.com/dod072198.htm