Sujet : Re: FOSS and backdoors in the US
De : rich (at) *nospam* example.invalid (Rich)
Groupes : sci.cryptDate : 11. May 2024, 05:49:04
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <v1mtc0$1rosf$1@dont-email.me>
References : 1 2 3 4 5 6 7 8
User-Agent : tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Chris M. Thomasson <
chris.m.thomasson.1@gmail.com> wrote:
So, is there a way to use a clean room, a clean computer and a clean
medium to store the encrypted file? Assuming clean means clean... ;^o
If you assume that "clean means clean" as to the computer hardware then
you don't necessarily need a "clean room" [1]. You just need the
hardware and software you are using at the time to be clean (as in free
of backdoors).
If they are free of backdoors at the time you are using them then your
actions on them disappear into history unrecorded (beyond whatever
outputs you intentionally made a record of).
[1] If you are being surveiled sufficient that some agency is
monitoring the RF emissions from your computer, at the same time you
encrypt whatever it is you are encrypting, with sufficient detail to
know what you are up to, then you likely have much bigger problems well
beyond whether Acme Corp installed a backdoor into your computer.
Plus keep in mind that "clean room" usually refers to particulate
contaminants, the phrase you likely are looking for is "Faraday cage".