Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Well, the NSA tampering here at least doesn't happen in the factories...


Even if they don't have physical access to factories I'm sure there are cases where they have (spurious) network access to factories and can replace a firmware blob that goes into routers or other equipment with a slightly different one with their tweaks without anyone noticing without looking really, really hard.


>repackages the devices with a factory seal.

But perhaps with the covert assistance of the factory?


Tamper evident only provides evidence of a home user that hasn't spent time learning how to evade them. You don't need the means to obtain or produce replica seals, but the NSA also has the money to do exactly that. And that assumes by 'seal' the author even meant to imply something as strong as tamper evident.


The article says the "NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers." The word"receives" suggests that the manufacturer knowingly sends the hardware to the NSA.


Or the company who prints the seals


If they for some reason had trouble replicating them they could just redirect the seal delivery too...


Or the seal maker?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: