It seems likely that it simply wasn't given any thought. Not so much that they did trust them, but that they didn't comprehend what could have been done, and so it never really bothered them that much.
Once it was made apparent just what the capabilities were, and how strongly the NSA was utilizing those capabilities, minds started to change.
>It seems likely that it simply wasn't given any thought. Not so much that they did trust them, but that they didn't comprehend what could have been done, and so it never really bothered them that much.
To my knowledge, 20 years ago Russian security agencies were trying to inspect in depth any foreign computer hardware (as there is no other computer hardware existed back then or even today in Russia) that they were buying. Not that one is able to seriously inspect beyond the level of the plastic body of a chip, yet they tried at least :)
The fact that these techniques do work fairly well for semiconductor reverse engineering is a reason that recent research on "stealthy dopant-level hardware Trojans" was scary.
as well as some other microscopy techniques that might conceivably detect these differences, but that it's more difficult and expensive overall compared to optical imaging.
That depends on your definition of "seriously" I guess. But there is no need to stop at the plastic. Have a look what the guys at chipworks are doing: http://www.chipworks.com
Also the Russians are traditionally quite good at reverse engeneering ;-) and they _did_ have their own domestic chips 20 years ago.
>they _did_ have their own domestic chips 20 years ago.
No. Not back then, not now. There hasn't been a chip there able to run Word/Excel/email. The best "native" chips are the 30 year old ones, with some updates, in the anti-ICBM systems.
Once it was made apparent just what the capabilities were, and how strongly the NSA was utilizing those capabilities, minds started to change.