EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS


Never Ever Use Coprocessors for Cryptology, Especially If Implemented in the United States

Posted in GNU/Linux, Hardware, Kernel, Security at 2:41 pm by Dr. Roy Schestowitz

Can you read the source code in this microchip?

AMD microchip

Summary: Why the hype about “accelerated” cryptology (like polygons rendering, but for cryptographic purposes) is a dangerous trap that should be shunned and perpetually avoided

THE QUICKEST and most convenient way to undermine all encryption is to weaken random number generation, e.g. lower the entropy, making keys more predictable and thus easily crackable by supercomputers (or even standard computers). This is effective against everything, including online financial transactions, simply because it cracks the very core components of today’s security: SSL, PGP, etc. My doctoral degree involved a great deal of work with entropy and my daytime job too sometimes involves it, so the subject is not foreign to me. I have been watching the NSA closely for a number of years, and always with great concern and suspicion. Now we know that the NSA compels (and even bribes) US companies to help undermine privacy, if not by direct handover of data (PRISM) then by making encryption too poor, setting up back doors, forcing companies to obey NSL/subpoenas, network wiretapping/DPI, or even a combination of all those things. No need for hypotheses anymore; there’s plenty of hard proof now.

Intel, a cleverly-named criminal company (serving the intelligence community), whose hardware-level random number generator (hidden in silicon) FreeBSD refuses to trust (OpenBSD too is historically very critical of Intel) is no longer the only x86 player seeking to manufacture consent (blind trust) for encryption with no source code, just minuscule circuits of semiconductors. AMD, another US company, is now following suit with ardware-level cryptology (i.e. cryptic algorithms for cryptology, which is a non-starter). This is bad just because AMD is a US company (FreeBSD did not single out the US); any company from any country should not be trusted with this type of task. It’s no better — and it is probably much worse — than proprietary software for one’s security. To quote Michael Larabel’s article about it: “Back in November was when patches first emerged for an AMD Cryptographic Coprocessor on Linux. This co-processor provides hardware encryption and other hashing functionality for the AES crypto API, AES CMAC, XTS-AES, and SHA cryptographic interfaces within the Linux kernel.

“Not much information is publicly known on this AMD Cryptographic Coprocessor but it’s believed to be part of AMD’s embedded ARM Cortex-A5 processor on upcoming server-class Opterons with TrustZone technology.”

“Have we learned nothing at all from Snowden’s explosive leaks?”So, Linux 3.14 will try to offload something so sensitive to proprietary code concealed in silicon. Bad idea. Very bad idea. Sure, it’s Linux, but it does open itself to some blobs (e.g. Microsoft’s hypervisor and more famously drivers for peripheral cards that handle graphics), firmware, and now peripheral, embedded-in-hardware proprietary algorithms. Have we learned nothing at all from Snowden’s explosive leaks? Just look what Microsoft has done (total complicity with the NSA). A new poll at FOSS Force asks: “Do you think Red Hat is cooperating with the NSA by building back doors into RHEL?”

The responses may surprise you. Only 42% say “No”. 28% say “I don’t know” and 30% say “Yes”. This relates to an article that alludes to Techrights. It was read by thousands and has been linked to by numerous news sites. I rarely ever comment in sites where identity cannot be verified (because of fakers), but this one challenged my claims and I had to respond. Here are my three replies:

It is not purely speculative. If you think that it is, then you must not have paid close enough attention.

I have been spending at least 2 hours per day since 2012 reading about the NSA. I knew what Snowden showed even before it was publicly known and I spoke about it with RMS on numerous occasions (he came to the UK to meet Assange and then myself, focusing on mass surveillance).

The truth of the matter just needs a little digging because the corporate press is not helping the general public find it out, just like it knowingly ‘buried’ a captured agent in Iran for several years (this leaked out in November).

Similarly, GNU/Linux sites did a very poor job covering (if at all) what happened in recent months regarding Linux. Let me summarise some facts (without links, as I don’t want to be put in the moderation queue again):

- Torvalds’ father said that the NSA had approached his son regarding back doors.

- Linux had a back door added to it about a decade ago. It got removed quickly afterwards and it wasn’t known who had added it. There was press coverage about it, but it was scarce.

- RSA received a bribe from the NSA to promote security standards with back doors.

- NIST and others had NSA moles and bogus (corrupt) peer review process to help usher in security standards with back doors.

- NSA is a large Red Hat client.

- The NSA sends patches to Red Hat, which in turn sends those for Linus Torvalds to put in Linux.

(the above two are now confirmed to me by Red Hat staff)

- BSD does not trust hardware-level random number generators, suspecting — quite rightly given the NSA’s track record — that it has too low an entropy.

- Several top-level Linux developers found vulnerabilities in Linux random number generation. They quietly (without much press coverage anywhere) addressed the issue (raising the entropy) a few months back. Only the latest kernel release has the fixes applied AFAIK (I don’t know if Greg K-H backported any of it because coverage is too scarce). To lay out the magnitude of this issue, it compromises SSL, PGP, etc. (pretty much everything with encryption, even passwords) not just at client side (desktop, tablet, smartphone) but also the server side (i.e. the Internet). This is huge! But the media hasn’t covered it.

Suffice to say, Red Hat has not done anything to convince me I was wrong. Instead, I notice that Red Hat staff is stalking me in LinkedIn and I see my article cited in several news sites which wrote about the issue in several languages (3 articles in Google News are in Spanish).

If you found holes in the above statements or if you want links attached, please request them and I will provide citations. I wrote about everything before, even years ago (NSA involvement in SLE* and RHEL I covered around 2007 or 2008).

I am frustrated to see people turning against the messenger rather than the message. I see a lot of the same done to Sam Varghese. We are making ourselves more vulnerable by refusing to listen to what seems uncomfortable.

Another reply:

I was thinking along the same lines — that Edward Snowden’s leaks (by the way, they’re not just his anymore, as anonymous people from the NSA reportedly leak more and more documents to be published under his name for their safety) can at some stage show encryption undermined at more levels (hardware level, or even kernel level). We already know that encryption was undermined at RSA and NIST by NSA moles, using bribes too. We also know that Linux (kernel) developers recently revised random number generators, after they had found a weakness.

Several state officials (in 6 state at the very least) now work to stop the NSA locally. Some call for a ban on companies that facilitate the NSA (that would include Red Hat), under the premise that they are complicit in crime. I am not kidding, watch the news this week (I don’t want to paste links here as the last time I did so my comment took half a day to appear).

Lastly, there are numerous E-mails sent from and to Red Hat. These further validated my suspicions.

I saw a lot of personal attacks (trying to discredit me or even remove links to my analyses). I even heard the usual personal attacks against Sam Varghese (which I expected from Red Hat because he dares to do real journalism, i.e. journalism that companies don’t like).

Trusting Red Hat should be based on its record, not emotional leanings and faith.

Don’t get me wrong. I was not offended by you and you oughtn’t be offended by my response. I am used to this type of divisive treatment (people trying to ostracise me) since the days I criticised Novell — only to be proven right throughout and at the very end (Novell gave its patents to Linux foes).

I hope you will wait patiently for more information and assess the facts based on their merit. Don’t rely purely/solely on what you read in OpenSource.com (Red Hat). I saw Novell doing its self-delusional spiel (IP “peace of mind”) and fortunately, at the end, Novell did not find enough fools to sell its lies to.

I have been frank in my analysis of Red Hat (on patents, build process, etc.) and if you want links for particular bits of my claims, just ask. I have a repository of tens of thousands of links I collect while researching. Sometimes people refuse to accept even a well-sourced claim because of cognitive dissonance — something I’ve had a lot of experience with when dealing with Microsoft spinners.

“Journalism is printing what someone else does not want printed: everything else is public relations.”

― George Orwell

Here is my original reply, challenging the counter-arguments:

This article starts with an incorrect assertion that I accuse “Red Hat of being in cahoots with the NSA.”

No, NSA is a big client of Red Hat (this was not just revealed but also confirmed to me by Red Hat staff some days ago, by E-mail) and it was also confirmed that NSA submits patches to Linux through Red Hat (think of NIST and RSA; we don’t even have NSA E-mail address to keep track of). Back doors can also be added outside the scope of source code, during a build process. My job involves dealing with this risk. I don’t think you read an essential earlier post:


This, in turn, links to proof that the NSA did try to put back doors in Linux, as noted by Torvalds the father. See:




Defending Red Hat makes sense, but mischaractering my position is a little unfair. I note that trusting Red Hat is not easy and based on articles I read half a decade ago, NSA was involved in the build process of Windows, OS X, SUSE, and Red Hat (only those 4 were mentioned).

The bottom line is this. Do not have blind trust in Linux. Not even access to source code is enough because the build process needs to be carefully checked and validated; moreover, Linux is joined with some proprietary code and even hardware-level code, so trust is seriously harmed. Now that we know about Red Hat’s relationship with the NSA we should ask ourselves if the NSA is once again trying to put back doors in Linux, or worse, maybe it already did. Letting blobs enter the pipeline helps the NSA achieve (but hide) what it already said it wanted to achieve.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New

  1. Luxembourg Can Become a Hub of Patent Trolls If the EPO Carries on With Its 'Reforms', Even Without the UPC

    With or without the Unified Patent Court (UPC), which is the wet dream of patent trolls and their legal representatives, the EPO's terrible policies have landed a lot of low-quality patents on the hands of patent trolls (many of which operate through city-states that exist for tax evasion -- a fiscal environment ripe for shells)

  2. The Patent 'Printing Machine' of the EPO Will Spawn Many Lawsuits and Extortions (Threats of Lawsuits), in Effect Taxing Europe

    The money-obsessed, money-printing patent office, where the assembly line mentality has been adopted and patent-printing management is in charge, is devaluing or diluting the pool of European Patents, more so with restrictions (monetary barriers) to challenging bad patents

  3. Links 17/3/2018: Varnish 6, Wine 3.4

    Links for the day

  4. Deleted EPO Tweets and Promotion of Software Patents Amid Complaints About Abuse and Demise of Patent Quality

    Another ordinary day at the EPO with repressions of workforce, promotion of patents that aren't even allowed, and Team UPC failing to get its act together

  5. Guest Post: Suspected “Whitewashing” Operations by Željko Topić in Croatia

    Articles about EPO Vice-President Željko Topić are disappearing and sources indicate that it’s a result of yet more SLAPP from him

  6. Monumental Effort to Highlight Decline in Quality of European Patents (a Quarter of Examiners Sign Petition in Spite of Fear), Yet Barely Any Press Coverage

    he media in Europe continues to be largely apathetic towards the EPO crisis, instead relaying a bunch of press releases and doctored figures from the EPO; only blogs that closely follow EPO scandals bothered mentioning the new petition

  7. Careful Not to Conflate UPC Critics With AfD or Anti-EU Elements

    The tyrannical Unified Patent Court (UPC) is being spun as something that only fascists would oppose after the right-wing, anti-EU politicians in Germany express strong opposition to it

  8. Links 15/3/2018: Qt Creator 4.6 RC, Microsoft Openwashing

    Links for the day

  9. PTAB Continues to Increase Capacity Ahead of Oil States; Patent Maximalists Utterly Upset

    The Patent Trial and Appeal Board (PTAB) sees the number of filings up to an almost all-time high and efforts to undermine PTAB are failing pretty badly -- a trend which will be further cemented quite soon when the US Supreme Court (quite likely) backs the processes of PTAB

  10. Patent Maximalists Are Still Trying to Create a Patent Bubble in India

    Litigation maximalists and patent zealots continue to taunt India, looking for an opportunity to sue over just about anything including abstract ideas because that's what they derive income from

  11. EPO Staff Has Just Warned the National Delegates That EPO's Decline (in Terms of Patent Quality and Staff Welfare) Would Be Beneficial to Patent Trolls

    The staff of the EPO increasingly recognises the grave dangers of low-quality patents -- an issue we've written about (also in relation to the EPO) for many years

  12. The EPO is a Mess Under Battistelli and Stakeholders Including Law Firms Will Suffer, Not Just EP Holders

    As one last 'gift' from Battistelli, appeals are becoming a lot more expensive -- the very opposite of what he does to applications, in effect ensuring a sharp increase in wrongly-granted patents

  13. The EPO Under Battistelli Has Become Like China Under Xi and CPC

    The EPO is trying very hard to silence not only the union but also staff representatives; it's evidently worried that the lies told by Team Battistelli will be refuted and morale be affected by reality

  14. Links 14/3/2018: IPFire 2.19 – Core Update 119, Tails 3.6

    Links for the day

  15. Links 13/3/2018: Qt Creator 4.5.2, Tails 3.6, Firefox 59

    Links for the day

  16. Willy Minnoye (EPO) Threatened Staff With Disabilities Said to Have Been Caused by the EPO Work Pressures

    Willy Minnoye, or Battistelli's 'deputy' at the EPO until last year, turns out to have misused powers (and immunity) to essentially bully vulnerable staff

  17. IAM and IBM Want Lots of Patent Litigation in India

    Having 'championed' lobbying for litigation Armageddon in China (where IBM's practicing business units have gone), patent maximalists set their eyes on India

  18. The Patent Trolls' Lobby (IAM) Already Pressures Andrei Iancu, Inciting a USPTO Director Against PTAB

    Suspicions that Iancu might destroy the integrity of the Office for the sake of the litigation ‘industry’ may be further reaffirmed by the approach towards patent maximalists from IAM, who also participated in the shaming of his predecessor, Michelle Lee, and promoted a disgraced judge (and friend of patent trolls) for her then-vacant role

  19. Patent Trolls in the United States Increasingly Target Small Businesses Which Cannot Challenge Their Likely-Invalid Software Patents

    South by Southwest (SXSW Conference/Festivals in Austin, Texas) has a presentation about patent trolls, whose general message may be reaffirmed by recent legal actions in Texas and outside Texas

  20. EPO Staff Union Organises Protest to Complain About Inability “of the Office to Recruit the Highly Qualified Staff it Needs.”

    Having already targeted union leaders and staff representatives, the EPO may soon be going after those whom they passionately represented and the staff union (SUEPO) wants the Administrative Council to be aware

  21. Battistelli Likes to Describe His Critics as 'Nazis', Team UPC Will Attempt the Same Thing Against UPC Critics

    Demonising one's opposition or framing it as "fascist" is a classic trick; to what degree will Team UPC exploit such tactics?

  22. Session in Bavaria to Discuss the Abuses of the European Patent Office Later Today

    The EPO shambles in Munich have gotten the attention of more Bavarian politicians, more so in light of the Constitutional complaint against the UPC (now dealt with by the German FCC, which saw merit in the complaint)

  23. Links 12/3/2018: Linux 4.16 RC5, KEXI 3.1, Karton 1.0, Netrunner 18.03, Debian 9.4

    Links for the day

  24. EPO Patent 'Growth' Not Achieved But Demanded/Mandated by Battistelli, by Lowering Quality of Patents/Services

    Targets at the EPO are not actually reached but are being imposed by overzealous management which dries up all the work in a hurry in order to make examiners redundant and many European Patents worthless

  25. Doubt Over Independence of Judges at the EPO Clouds Reason in Deciding Regarding Patents on Life

    With the growing prospect of a Board of Appeal (BoA) having to decide on patentability of CRISPR 'innovation' (more like explanation/discovery), questions linger or persist about judges' ability to rule as they see fit rather than what some lunatic wants

  26. Patent Academics and CAFC Make a Living Out of Patents, But Both Must Begrudgingly Learn to Accept That Patents Went Too Far

    A look at academic pundits' views on the patent system of the United States and where the Federal Circuit (a high patent court) stands on these matters after the US Supreme Court (highest possible court) lashed out at many of its decisions, especially those from the disgraced Rader years

  27. Patent Maximalists Cause a Crisis of Legitimacy for Patent Law

    The patent extremists who nowadays equate monopolies on mere ideas to "property" and "rights" gradually cause the public to lose respect for patents, more or less in the same way copyright maximalists (and copyright trolls) cause the population to seek alternatives (both legal and illegal)

  28. We Shall Soon Find Out Where Trump Appointees Such as Neil Gorsuch Stand on Patent Policies

    Staff shuffles at top-level roles will soon reveal what Donald Trump's changes mean to patent law and caselaw

  29. Trump's USPTO Changes Patent Designs, Changes Director/Deputy Director, and Anticipat 'Ranks' Patent Examiners Based on How They Deal With Section 101

    Today's USPTO isn't the same USPTO which was managed by Michelle Lee and anti-PTAB groups (proponents of software patents) have begun profiling examiners based on their stance on abstract/software patents -- a form of neo-McCarthyism

  30. Links 10/3/2018: Amarok 2.9.0, Debian 9.4, Sparky 5.3

    Links for the day


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time


Recent Posts