[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
Intel spying our asses
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 36
Thread images: 7
File: image.jpg (58 KB, 420x480) Image search: [Google]
image.jpg
58 KB, 420x480
Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine. When these are eventually compromised, they'll expose all affected systems to nearly unkillable, undetectable rootkit attacks. I've made it my mission to open up this system and make free, open replacements, before it's too late.

More about this;
http://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html
>>
>>55179066
> I've made it my mission to open up this system and make free, open replacements, before it's too late.
You're the hero that /g/ needs but doesn't deserve, godspeed my dude... godspeed.
>>
>>55179066
>>55179088

>Posters: 2
I find that hard to believe
>>
Kill yourself tripfag
>>
>>55179066
Let me know when you can beat intel at x86
>>
You're like 8 years late
>>
>x86
>recent
who or what would that even apply to?
>>
File: 1454872464489.jpg (131 KB, 565x575) Image search: [Google]
1454872464489.jpg
131 KB, 565x575
>>55179066
>I refer to the ME as the Damagement Engine, since it is a hardware add-on that damages your security.

THE SOUL OF WIT RIGHT THERE FOLKS
I bet that joke tested well with all his friend.
>>
>>55179066
Is it bad that I've downloaded and installed ME software and firmware updates from here: http://www.win-raid.com/t596f39-Intel-Management-Engine-Drivers-Firmware-amp-System-Tools.html
>>
>>55179116
Waiting for zen. Fuck Intel

>>55179132
I'm quite sure he meant everything intel has out atm minus arm.
>>
>connecting computers to a network and expecting them to be secure
anon...
>>
>So, what we have is an open source crusader scaring the daylights out of people on a giant what-if scenario that even he admits couldn't happen in our lifetimes.

I wonder who the real shill is here ?

>That's 2,048-bit security, which would require any attempt to break it to factorize semi-primes with approximately 617 decimal digits, which Zammit admits at this point is "pretty much impossible in one human lifetime for anyone with the biggest supercomputer."
>>
>>55179210
>he
>>
File: 1466163233410.jpg (208 KB, 1032x774) Image search: [Google]
1466163233410.jpg
208 KB, 1032x774
>>55179066
>>
You could just block its traffic with a trusted hardware firewall. From what Intel states it's a matter of blocking a certain range of ports, which any home router already does. For the truly paranoid, you can block the Intel ME interface with packet fingerprinting and filtering.
>>
>>55179316
it
>>
>intel is spying on you!
I assume you have logged this network traffic.
>but they have network management shit built into their processors!
So does most of the hardware in your system and it is probably put to use by many businesses. Doesn't mean Intel is farming data from everyone.
>but it could allow unkillable rootkits!
Our hardware has always been vulnerable and the best defense has always been the same thing. Common sense.
>>
File: lel.jpg (284 KB, 2400x2740) Image search: [Google]
lel.jpg
284 KB, 2400x2740
>they fell for the x86 meme
>>
>x86 cpus

I remember 2005, too
>>
My wife's son's father works at Intel and he can confirm this.
>>
Amd has his own version called psp.
>>
>>55179066
>China makes a 256 core CPU that has better multithreaded performance than a Xeon
>Intel is busy bloating their chips with backdoors
>>
>>55179282
The point about factorization is moot once quantum computers move a bit further along in their development.
>>
>>55179863
>amd cpus have exploitable backdoors
[citation needed]
>>
>>55179883
>AMD Platform Security Processor (PSP)

>This is basically AMD’s own version of the Intel Management Engine. It has all of the same basic security and freedom issues, although the implementation is wildly different.

>The Platform Security Processor (PSP) is built in on all Family 16h + systems (basically anything post-2013), and controls the main x86 core startup. PSP firmware is cryptographically signed with a strong key similar to the Intel ME. If the PSP firmware is not present, or if the AMD signing key is not present, the x86 cores will not be released from reset, rendering the system inoperable.

>The PSP is an ARM core with TrustZone technology, built onto the main CPU die. As such, it has the ability to hide its own program code, scratch RAM, and any data it may have taken and stored from the lesser-privileged x86 system RAM (kernel encryption keys, login data, browsing history, keystrokes, who knows!). To make matters worse, the PSP theoretically has access to the entire system memory space (AMD either will not or cannot deny this, and it would seem to be required to allow the DRM “features” to work as intended), which means that it has at minimum MMIO-based access to the network controllers and any other PCI/PCIe peripherals installed on the system.
>>
>>55179913
>In theory any malicious entity with access to the AMD signing key would be able to install persistent malware that could not be eradicated without an external flasher and a known good PSP image. Furthermore, multiple security vulnerabilities have been demonstrated in AMD firmware in the past, and there is every reason to assume one or more zero day vulnerabilities are lurking in the PSP firmware. Given the extreme privilege level (ring -2 or ring -3) of the PSP, said vulnerabilities would have the ability to remotely monitor and control any PSP enabled machine. completely outside of the user’s knowledge.
>>
So the goal of these security co-processors is to basically allow the US government to covertly install spyware on any computer in the world, right?
>>
>>55179913
>>55179925
>>In theory
if you were to go that route
>you are most likely to be killed than your computer is to crash or be stolen, jamal
>>
>>55179203
Kek
>>
>>55180389
>>>/pol/
>>
Where will you be when Apple switches to ARM processors and Windows PCs stay with said x86 chipsets?
>>
>>55180389
It's the same for both intel and amd you can't audit the code so it's just "in theory" but still a security risk inside the hardware (a fucking ring -3 security problem).
>>
>>55179210
zen has the same shit you retard. In fact i would reckon amd's shit is less secure than jewtel.
>>
who cares
>>
Try not to shoot yourself twice in the back of the head. Seriously I'd hesitate to announce such a thing.
>>
File: lain slow.gif (295 KB, 700x704) Image search: [Google]
lain slow.gif
295 KB, 700x704
>>55179210
>Waiting for zen. Fuck Intel
AMD has had something similar in all post-2012 processor designs (Steamroller, Excavator, and Zen when it comes out), they call it the Platform Security Processor or more recently the Security Processor. Only their current Vishera series and older APUs are safe.

>>55179282
You left out how the US government has been trying to set a legal precedent for forcing companies to sign malware for them recently.
Thread replies: 36
Thread images: 7

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.