One-Time Pad should jump arround in Memory faster than CIA (not NSA!!!) can read it out by Hardware Backdoors (Shanon/Nyquist)
i guess that the CIA (not the NSA!!!) has some sort of Hardware Backdoors in most of the devices available.
Simplest way would be that the WLAN card (they probably would use this way, because it has an antenna that maximizes the range and not like Jacob Applebaum in said in „to protect and infect“ at the 30c3 eg in the network plug) Firmware, and that thing has possibly DMA Access so they could read out the one time pad easily. So probably it would be wise if the pad would jump arround in the Memory faster than can be read out by this Channel, eg. 300Mbit/s 801.11n, Shannon/Nyquist .
The other thing is that we guess the Equation Group stuff is widely in use and if I would be the CIA (not NSA) I would also place an RF module in the Harddisk, to be as near as possible at the data they want to steal or delete. Or probably the Equation Group Firmware makes some side channel noise that could be fetched with tempest [3,4], where it could be red from the disk directly.
Any idea about this sort of problems?
With Kind regards
Marc Landolt jr.
dipl Informatiker HF
+41 79 291 07 87
Could that be found out if i would protocol all the system calls, so i would see if something like AX.25 with low bandwith would enable eg. the Wireless interface without telling me?