Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
Now the pentagon is creating a list of not to use software
Message
<blockquote data-quote="ForgottenSeer 58943" data-source="post: 752903"><p>Nope. TAA is to meet govt. supplier certifications for 'significantly US' products. It doesn't apply at all to consumers unless the manufacturer declares their entire product line TAA compliant. Consumer stuff - good luck there. Backdooring TAA compliant stuff is going to be way harder for China. The reason is, those chips come in from one place, the board another, the caps another. All of it gets hand assembled in the USA after testing and validation. Then the software which is entirely made here gets loaded on and validates the hardware integrity. Backdooring it would generally require access to the development code and assembly line.</p></blockquote><p></p>
[QUOTE="ForgottenSeer 58943, post: 752903"] Nope. TAA is to meet govt. supplier certifications for 'significantly US' products. It doesn't apply at all to consumers unless the manufacturer declares their entire product line TAA compliant. Consumer stuff - good luck there. Backdooring TAA compliant stuff is going to be way harder for China. The reason is, those chips come in from one place, the board another, the caps another. All of it gets hand assembled in the USA after testing and validation. Then the software which is entirely made here gets loaded on and validates the hardware integrity. Backdooring it would generally require access to the development code and assembly line. [/QUOTE]
Insert quotes…
Verification
Post reply
Top