Reply to post:

USA decides to cleanse local networks of anything Chinese under new five-point national data security plan

tekHedd

I've heard similar stories from engineers going back to the days of mainframes and core memory. MiB's show up (or call or contact a manager) and say "you will use *this* algorithm in this piece of core system code," and then disappear again. Not second-hand stories either... once you hear enough of them you stop questioning whether it's happening and just assume everything is backdoored.

Some of the bigger players talk a good privacy game, but nobody says "no" to The Man.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon