Supply-Chain Security and Trust
Schneier on Security
SEPTEMBER 30, 2019
In both cases, we want to verify that the end product is secure and free of back doors. Sometimes we can do this for some classes of back doors: We can inspect source code this is how a Linux back door was discovered and removed in 2003 or the hardware design, which becomes a cleverness battle between attacker and defender.
Let's personalize your content