In my comment on the last article I posted, I mentioned Ken thompson's article about having to trust your computing environment right down to the level of the hardware manufacturer itself.
Then I ran across an article with information about US laws requiring "secret" backdoor access to your information by law-enforcement agencies. Access that was likely abused by the maker of hardware for their own governments's spying efforts. Don't trust any entity if it's really important.
Fortunately, what most of us do is not that private.
A third article on trusting your computer/phone.
In my comment on the last article I posted, I mentioned Ken thompson's article about having to trust your computing environment right down to the level of the hardware manufacturer itself.
Then I ran across an article with information about US laws requiring "secret" backdoor access to your information by law-enforcement agencies. Access that was likely abused by the maker of hardware for their own governments's spying efforts. Don't trust any entity if it's really important.
Fortunately, what most of us do is not that private.