- Whoa! There is some SERIOUSLY WRONG information in here.
-
- Having been involved with microprocessors long before
the general public even knew the word, here is some of what I found:
-
- 1. "For years, the National Security Agency (NSA)
maintained highly classified back doors into..."
- The NSA also has maintained back doors into Windows and
teh Mac as well. More than 5 such back doors exist, and this was already
proven by a friend of mine who took them out one by one. Upon removing
the last one, his computer stopped accessing the internet. He called his
ISP, who after a moment of silence said "try it now" and then
it worked.'Also, it is interesting that Madsen NEVER ONCE refers to the
back door in PGP. If he was really writing a tell-all, that too would have
been mentioned but was not.
-
- 2. "The encryption mechanisms, according to a U.S.
intelligence source, were contained in an electronically programmable read-only
memory (EPROM) unit known as HC6800 (the "HC" standing for "Hagelin
Cipher"). "
-
- The HC6800 is NOT an EPROM, but is the name of a CPU.
EPROMs are used to store the actual firmware.
-
- Part numbers of EPROMS in the days of the 6800 were 1702A
(the first EPROM, which held 256 bytes x 8 bits), 2708 (1k x 8 bits), 2732,
2764, 27128, etc.. HC stands for "High speed CMOS" and is well
known by all EEs today, and is the name of the process technology that
makes the chips. You can verify this at any of the chip manufacturers websites."6800"
is the name of Motorola's first 8 bit microprocessor. HC6800 is a very
old chip. Chips from Motorola at the time, all began with "MC"
and would also end with a package code.
-
- For example, an "MC6800P" would be the part
number of the microprocessor in a plastic DIP package. I've seen the device
myself in industrial products, back in the early 80's. The 68000, 68010,
etc... were the sucessors to the 6800, and these are the chips that powered
the Mac for more than 10 years when it first came out. These were 64 pin
chips, in dual-inline packages. Again, all this has been published in chip
manufacturer databooks and is well known. I still have some of those data
books both here at home, and in my office.
-
- 3. "That was, until 1993, when the Soviets became
aware of the Crypto AG secret project..."
- Hello? The iron curtain fell in 1989 and the Berlin wall
with it, and the term "Soviet" was no longer used. No one used
it in 1993. If anything, the term "Russian" was used after 1989.
-
- There is just too much wrong in the article to cover
here. The volume of information is far too great for Madsen to have all
of it. Much of what he rants on about, is already public information and
easily obtained with a search engine. It doesn't work that way in the intelligence
community. Everything is on a need-to-know basis.
-
- Ted
-
-
- Comment
- M. Levy
- 9-20-5
-
- I don't know about all Madsen wrote, nor Twietmeyer,
but when the name 'Rafi Eitan' and 'Israeli intel' pop-up in regard to
crypto PROMIS software and its trap doors - neither of whom mention it
- the death of security can't be far behind.
|