[ale] Microsoft proves crypto backdoors are a bad

Charles Shapiro hooterpincher at gmail.com
Tue Aug 16 09:26:54 EDT 2016


No! Say it ain't so!

Also this (
https://www.wired.com/2015/09/lockpickers-3-d-print-tsa-luggage-keys-leaked-photos/
)

--  CHS


On Mon, Aug 15, 2016 at 7:55 PM, Stephen R. Blevins <
stephen.r.blevins at gmail.com> wrote:

> Saw this last week at reason.com/encryption,
> TheHill.com/policy/Cybersecurity, and schneier.com (blog).
>
> The articles all make the same argument that Apple did with the FBI:
> Some day, at some time, by somebody, backdoors *will* get exposed to the
> general public.
>
> Stephen R. Blevins
> stephen.r.blevins at gmail.com
>
> On 08/10/2016 11:58 AM, DjPfulio wrote:
> > Saw this on another  list. Didn't know if the op was OK w/ his info on
> here.
> > Finally free !
> >
> >
> > "Microsoft leaked the golden keys that unlock Windows-powered tablets,
> phones and other devices sealed by Secure Boot"
> >
> > "These skeleton keys can be used to install non-Redmond operating
> systems on locked-down computers. In other words, on devices that do not
> allow you to disable Secure Boot even if you have administrator rights -
> such as ARM-based Windows RT tablets - it is now possible to sidestep this
> block and run, say, GNU/Linux or Android."
> >
> >
> > Bungling Microsoft singlehandedly proves that golden backdoor keys are a
> terrible idea
> > Redmond races to revoke Secure Boot debug policy
> > http://www.theregister.co.uk/2016/08/10/microsoft_secure_boot_ms16_100/
> >
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20160816/3c5169fd/attachment.html>


More information about the Ale mailing list