{"id":6946,"date":"2014-02-25T23:52:22","date_gmt":"2014-02-26T04:52:22","guid":{"rendered":"http:\/\/www.opensource.im\/?p=6946"},"modified":"2014-02-25T23:52:22","modified_gmt":"2014-02-26T04:52:22","slug":"a-brief-rundown-of-the-spying-questions-intels-ceo-wont-answer","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/a-brief-rundown-of-the-spying-questions-intels-ceo-wont-answer.php","title":{"rendered":"A Brief Rundown Of The Spying Questions Intel&#8217;s CEO Won&#8217;t Answer"},"content":{"rendered":"<p><p>    In a Reddit Ask Me Anything last Wednesday, Intel CEO    Brian Krzanich opened the floor for questions, but notably    ignored the most popular one in the thread: in light of    recent NSA revelations, what will the company do to assure that    its chips don't contain a backdoor for the NSA?  <\/p>\n<p>    While Kzarnich never answered any of the security-related    questions--Intel PR says this is because the questions came    late and Kzarnich either missed them entirely or couldnt reply    in time--one Redditor, Bardfinn, responded at length on the issue of encryption and    security.  <\/p>\n<p>    Bardfinns real name is Steve Akins, and in an email correspondence he    describes his interest in cryptography and Internet security as    personal and societal\/political. But hes quite literate on the    subject.  <\/p>\n<p>    Its an immense problem for the layman, Akins says.    Cryptography is difficult to use, touches many parts of our    lives, and has not become significantly less difficult in the    past 30 years In our tablets and smartphones, and the networks    they connect to, cryptography is handled for us by the    manufacturers. We never see it, never interact with it, and in    many cases *cannot* interact with it. Were placing an immense    amount of trust in the cryptography of manufacturers, Akins    argues, and therefore were effectively trusting them not to    peek.  <\/p>\n<p>    Of course, everyone cant be a skilled cryptographer, and since    absolute security isnt really possible, there will always have    to be some element of trust involved between manufacturers and    everyday people--but Akins believes that trust needs to be    verifiable, mitigated, and distributed:  <\/p>\n<p>      The problem isn't that we have to trust a black box in our      personal devices. The problem is that we have to trust that      one black box, and many black boxes on the Internet (or      cellular network) which may or may not be as secure as the      black box in our devices, and the ones in our computers and      the ones in the networks interoperate at the lowest common      denominator, and they all probably have back doors (which      makes it really hard to actually trust them), and the ones on      the Internet are highly targetable by the bored kids,      criminals, etc: Bad Actors.    <\/p>\n<p>    To understand the root cause of this concern, and what can be    done about it, it helps to have some understanding of how your    computer goes about encrypting things to ensure that prying    eyes dont see what you dont want them to see. For your    computer to lock your data up tight and send it on its way, it    relies on something that computers are in reality quite bad at:    randomness.  <\/p>\n<p>    Random numbers are a necessity for building secure systems, as    theyre the only way to make sure your encryption key stays secure.    However, generating random numbers can be extraordinarily    difficult, especially with software. Programs and computers are    run by logic and if-then conditionals--asking them to pull    numbers out of thin air without a prescribed formula is the    sort of simple thing human minds can do that trip up computers.    We call that predictability entropy. The higher your entropy,    the harder it is to crack your encryption.  <\/p>\n<p>    Since its so hard to come up with a software solution that    adequately generates random numbers with high entropy for    encryption, its become possible to mitigate that by turning to    your computers processor. Which is where Intel comes in.  <\/p>\n<p>    Ever since the company launched its Ivy Bridge line of    processors in May of 2012, its included what it calls Secure Key technology for the purpose of    random number generation. It is, essentially, a black    box--an opaque system built for a specific purpose (random    number generation) but with little to no insight as to how it    actually accomplishes it.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.fastcolabs.com\/3026860\/a-brief-rundown-of-the-spying-questions-intels-ceo-wont-answer?partner=rss\" title=\"A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer\">A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In a Reddit Ask Me Anything last Wednesday, Intel CEO Brian Krzanich opened the floor for questions, but notably ignored the most popular one in the thread: in light of recent NSA revelations, what will the company do to assure that its chips don't contain a backdoor for the NSA? While Kzarnich never answered any of the security-related questions--Intel PR says this is because the questions came late and Kzarnich either missed them entirely or couldnt reply in time--one Redditor, Bardfinn, responded at length on the issue of encryption and security. Bardfinns real name is Steve Akins, and in an email correspondence he describes his interest in cryptography and Internet security as personal and societal\/political. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-6946","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/6946"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=6946"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/6946\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=6946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=6946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=6946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}