Som Khanan påpekar, så hamnade PZ i klistret, då han delvis nekade NSA att installera "Backdoor" i programmet, samt delvis för att PGP distribuerades utomlands, då det var exportförbud på kraftigare krypteringsalgorithmer än 64 bitars.
Historier berättar att han kom förbi exportförbudet, med att skriva ut sourcekoden i bokform, som sedan OCR-scannades och korrekturlästes i Norge! (Men det är en annan historia)
Här kan man läsa mer:
http://en.wikipedia.org/wiki/Backdoor_%28computing%29
Beskriver bland annat hur man kan få till det utan att det syns i sourcekoden.
Här är ett utdrag.
A traditional backdoor is a symmetric backdoor: anyone that finds the backdoor can in turn use it. The notion of an asymmetric backdoor was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology: Crypto '96. An asymmetric backdoor can only be used by the attacker who plants it, even if the full implementation of the backdoor becomes public (e.g., via publishing, being discovered and disclosed by reverse engineering, etc.). Also, it is computationally intractable to detect the presence of an asymmetric backdoor under black-box queries. This class of attacks have been termed kleptography; they can be carried out in software, hardware (for example, smartcards), or a combination of the two. The theory of asymmetric backdoors is part of a larger field now called cryptovirology.
There exists an experimental asymmetric backdoor in RSA key generation. This OpenSSL RSA backdoor was designed by Young and Yung, utilizes a twisted pair of elliptic curves, and has been made available.
Så om detta USB-minne inte har en bakdörr, är jag jultomten
Ho, ho, ho