E.g. https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
If someone can touch the hardware or software at any point along the way, one cannot guarantee that the computer hasn't been compromised.
Relatedly, I wonder how many of the VPN companies out there end up being less secure communications routes than simply trying to remain anonymous. And, IIUC, the NSA can keep any encrypted communications it finds for N years - even if that communications couldn't legally be kept if it weren't encrypted. IOW, one (in some sense) draws attention to oneself by using encryption... :-/
Cheers,
Scott.
If someone can touch the hardware or software at any point along the way, one cannot guarantee that the computer hasn't been compromised.
Relatedly, I wonder how many of the VPN companies out there end up being less secure communications routes than simply trying to remain anonymous. And, IIUC, the NSA can keep any encrypted communications it finds for N years - even if that communications couldn't legally be kept if it weren't encrypted. IOW, one (in some sense) draws attention to oneself by using encryption... :-/
Cheers,
Scott.