Do any of you care about the fact that all modern micro-processors from Intel and AMD are backdoored?
E.g. Intel management engine allows signed code to hijack every component of your hardware. It's like a segmented, hidden part of the processor solely dedicated towards "updates" and you can't turn it off. So even Linux fags using whole disk encryption are still vulnerable.
ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf this is also a good paper related to this subject >if no backdoor in your software, compiler probably implemented one >if no backdoor implementing compiler then your hardware probably implemented one
Nice Did you know all modern AMD have a ARM co processor for "power management and microcode updates" Did you know that modern Intel chips for laptops have a sound analyzer built in
Nicholas Collins
No.
Justin Bell
can you into STUX?
David James
Stallman was right
Jaxson Cook
Spend enough time in the IT industry and you'll realize that there's nothing you can do short of design and forge your own micro-architecture to get away from back doors, keylogging, spyware, etc. Security is a sham. Linux is a sham. Either use technology and be spied on or don't use technology and live in the woods. Those are your only two options and sadly, there's no hope that will change any time soon.
Christopher Stewart
migrant from Sup Forums here. this is mostly intel vPro processors. some others may have administrative backdoors but do your homework when buying and use a firewall appliance for your home network. it's your responsibility to enforce your privacy and if you don't take it seriously you can't expect anyone else to.
James Martinez
Thankfully it seems they use such things only against very high value targets. Even if you're a wanted criminal you're most likely pretty safe.
Asher Price
There is in fact Isolation is key Your CPU might spy on you But if it can't connect
Jose Gomez
>Do any of you care about the fact that all modern micro-processors from Intel and AMD are backdoored?
Well what are we going to do about it? There's no real alternative processors available, it's not like we can all go and buy those Libreboot laptops.
Jace Price
>But if it can't connect they have already demonstrated multiple ways of transferring data from computer to other computers in proximity without being connected to any network.
Easton Carter
Most people are not smart enough to do that. A small minority even knows that is an option.
Cameron Hall
Like I said Isolation Physical isolation Sound barriers Lead walls
Samuel Sanchez
Snowden was a plant
Is a libreboot thinkpad still viable?
Anthony Gutierrez
we're doomed. nice digits.
Levi Garcia
Well boys Kek has spoken Isolate your computers
Jace Phillips
I really don't like living in the woods but if kek wills it...
Elijah Reed
it's true there is now "theoretical" malware that can get on air gaped computers so nothing is safe. you might as well just give into multiple zero day infections on you PC at all time if you're using a Microsoft or Macintosh OS
Jace Thomas
FPGAs are the future. Partially randomized soft CPU layouts
Tyler Watson
No they're really not They're useful but not for desktop computing
Christopher Moore
This is interesting. Where did you hear about this?
Nathan Wright
>So even Linux fags using whole disk encryption are still vulnerable. HDDs are backdoored too.
Yup this field breeds paranoia because you realise there's no way to be completely secure. If you piss off the state enough they WILL find you.
The thing is they don't care enough, nor do they have the resources to crack down on some mongolian knitters sharing chinese cartoons. That's the only thing that really keeps you safe.
Ayden Morris
ME disabled and its firmware absent, no updates to 2006 intel microcode, FOSS linux, FOSS BIOS, only using FOSS software, encryption of entire disk no exceptions + USB storage only to eliminate DMA no exceptions + SSD with quick access to ATA secure erase (yes this SSD wipes all flash chips, no shortcuts), ath9k atheros WLAN over USB to eliminate DMA,
the only nonfree code in my system is my sound controller firmware (2006), the SSD firmware (which has no DMA) (2011), the original intel cpu microcode (2006), and firmware for controller that turns my caps lock and battery charging lights on and off (2006 or 2007), and wireless card firmware (atheros), and wired NIC firmware (never has network connection).
I may not be guaranteed absolutely secure, but sure as hell i'm a lot more than you faggots
Jonathan Fisher
No Really not my man Because of how a FPGA fundamentally works you can put a lot more static gates on a chip than switchable ones and that will never change
Jace Edwards
>acoustin Why bother? You could do better with radiowaves wising parts of motherboard as antenna.
Brayden Roberts
>MFW still using a Core 2 Duo.
Connor Myers
>nor do they have the resources to crack down on some mongolian knitters sharing chinese cartoons. soon they will. with cheap droids that they will flood every city with.
Almost all tech giants are working on all aspects of that.
Boston Dynamics, that was working for DARPA to make bipedal machines, was bought by google, along with a TON of other comparable companies and others that are working on AI.
Ethan Gray
>falling for the digital jew
Cooper Watson
That is clever. It's really a case though of everyone just missing a transmitter/receiver pair in the standard airgapping protocol. It doesn't invalidate it on principle. You can argue that there will "always be another" but you have to rely on more and more sophisticated RF spying equipment etc.
Jose Lewis
top kek mate, my drone can capture your flying rat
David Martinez
That's true, but if privacy and security are your main concerns then you can sacrifice some performance to that end. Also, think about how much x86 arch wastes space compared to something like ARM with all of the bullshit instructions that must be supported. I'm willing to bet that you can easily match performance on an FPGA-instantiated CPU to almost any real RISC processor which, honestly, is pretty impressive.
Charles Phillips
Pretty much. NSA/military techniques will always be ahead of us as we're hobbled from the start.
Thomas Adams
Yeah, and they're already storing data en masse faster than they can filter it to facilitate this future.
Again, this field makes you so paranoid it's ridiculous. It's so incredibly fucked.
Nicholas Phillips
so it's time to buy chinese processors?
Asher Morales
Hahahahahaha
Yeah, sure.
Nicholas White
I'm willing to take that bet because no It's really not Also the x86 instruction set is still more useful for desktop computing than ARM8 is
Kayden Anderson
>tfw have worked with mediatek processors Those are just blatantly malware Also utterly shit
Benjamin Thomas
You'd lose that bet, people use FPGA soft cores all the time and they are not good. Vendors are going the other way and integrating hard ARM cores into FPGAs.
Jaxson Ward
>tfw my pc has a i7-6700k that i just bought a week ago am i fucked lads?
Thomas Long
>Again, this field makes you so paranoid it's ridiculous. It's so incredibly fucked. yup. >faster than they can filter it easily solved by AI.
might as well lube up
Adam Stewart
I wonder if building your rig inside a faraday cage would be of any help?
Owen King
You've been fucked for years.
Just live your life, big brother loves you.
Dominic Thomas
>wasted money on a 6700k Trust me, the government doesn't care about idiots like you.
Dylan Allen
>microdrone flies into your room and connects to your pc How fucked are you then
Asher Powell
If you like Chinese government spying on you.
Nathan Jones
That micro drone might as well connect itself inside my anus so at least I'd feel some pleasure of the procedure
Brody Watson
Rather if you like literally anyone spying on you Chinese are garbage at making secure backdoors
Caleb James
>wasted money poorfag detected
Nolan Wood
How would that work?
Data must flow into the CPU somehow in order to trigger the execution through a hardware-based backdoor. This is no different than running any other kind of malware.
Nolan Diaz
kek, faraday would help (at least until they use quantum entanglement??) but youd have no internet anyway
inb4 they add a espionage layer on top of AC
Leo Cook
>thinking I meant spend less He bought an inferior chip.
Nicholas Carter
Have there been any FPGA soft core experiments specifically using GOOD processor designs rather than say the dogshit NIOS processor?
Julian Watson
confirmed Kek has spoken.
Cameron Lewis
>tinfoil conspiracy believers are actually right on tinfoil
Ayden Ramirez
>le quantum entanglement meme Nice
Connor Harris
> It's like a segmented, hidden part of the processor solely dedicated towards "updates" That's nothing new, at all. Still you have to explain me how this "segmented, hidden part" of my processor gets to execute shit. If they don't have a secret opcode built in they can't do shit and rely on the software to enable a specific processor mode or load a special address. These things would be found immediately since it would break existing code that's in accordance with the "official" CPU spec.
The only way would be for the processor to trigger a secret interrupt to execute some specific microcode from time to time. And then what would it do? You'd need a whole operating system inside your processor with paging and filesystem drivers and everything. And then you still haven't established something worthwhile.
The only thing a CPU manufacturer can fuck you over is by skewing the built-in RNG when used by cryptography.
Lucas Gonzalez
This too.
Parker Campbell
The only difference is that it would be invisible and not removable via software. But I think it's true that there is no demonstrated backdoor in Intel ME.
Processor vendors use very large FPGAs for sim/validation and the clock rate is dogshit slow. They would really like it to go faster.
Isaac Reyes
>All this security so that I can browse a cartoon board.
Luke Turner
top kek. watch this episode of "Black Mirror" (don't worry, every episode is an entirely different story and cast, you don't need to have seen any other episode)
>tfw they already do I got shitty Meizu smartphone.
Alexander Carter
AMD got around this by having an ARM coprocessor that starts first and keeps "managing" it's host Some guy found a way to listen in on their connection and AMD shut him down
Brayden Parker
top kek mate, even my old ass thinkpad has chips that function outside and above the OS (for (((security)))
David Clark
If you've been reading this thread without thinking the words industrial espionage, just stick to the cartoons.
Bentley Ramirez
>falling for the crypto-digital jew
Luke Gray
>Some guy found a way to listen in on their connection and AMD shut him down Link? Sounds interesting.
that's already outdated and they use better means now
Hudson Gomez
The point is that nothing is impossible to overcome when it comes to computers.
Elijah Rodriguez
>sound controller firmware
You dun goofed, now we'll backtrack your IP and watch you fap to anime in the dark.
Anthony Jackson
>they don't have a secret opcode built in But they do.
>You'd need a whole operating system inside your processor with paging and filesystem drivers and everything. Why not? blog.kaspersky.com/equation-hdd-malware/7623/ It doesn't need to do complex tasks mostly providing backdoors for downloading and installing worms. Also masking these worms from detection.
Jaxon Rodriguez
no but it gets more complex and then eventually you need industry specialist tools to do anything
Nicholas Hall
And at that point, they can just regulate the companies who have the tools like any other industry.
Aaron Lopez
You can't "update" a CPU.
Isaac Johnson
>you can't update a CPU Oh leaf You naive fucker You can limit or activate hidden instructions Sure you can't just change the CPU physically
Chase Sanchez
How far back did they start doing this? I would be willing to build a completely new computer with 2007 parts for example just for doing Internet related things and then use my bot net 9000 desktop for gaming and work
Isaac Smith
the company name is literally INTEL
cant even make that shit up
Nicholas Ward
Of course there are processors with hypervisors.
But you have to still find a way to exploit that. What is the hypervisor going to do? Sending random parts of your memory packaged as IP packages to the Network device? And when should it do this? All the time with all processors? You need to work harder than that. And at the point where you install software implementations to secretly trigger the hypervisor you could have stolen the data you seek anyways. You have to convince me that malicious processor design creates risk that haven't been there before.
Daniel Foster
What groups of people does the government actively spy on anyways? As in perceive them to actually be a threat and not just a permavirgin on an anime imageboards?
Is it just TOR users and hackers?
Gabriel Morgan
Sound analyzer?
Aiden Watson
>2007 nah, you'd have to go WAY back
Lucas Sanders
convince me a government that lets the secretary of states private emails be published in the thousands online has the bureaucratic and technological know how and man hours to employ a vast dragnet of every CPU
What algorithm is going through all that data, there is too much going on for anything to matter.
Lincoln Diaz
>What groups of people does the government actively spy on anyways? they collect mass data. but right now, they don't do much with the data from the masses, only select groups.
Until the AI is built, then they can watch everyone and filter and search through all data, all the time.
Joseph Green
or you update it with small components that you produce yourself.
if you know how to build something, you would also know how to change it.
Mason Ward
see they have been collecting all data, but have not yet been able to use it all. this will happen as soon as the AI is built, and every tech giant is working on AI right now
Ryder Nelson
>falling for the silicone jew
Chase Davis
>tfw working at a influential company in the semiconductor industry You guys don't want to know
William Clark
>What groups of people does the government actively spy on Pretty much everyone desu. All your emails and preety much anything you've ever posted online is available to them
Thomas Morris
Google sold off boston dynamics.
Leo Peterson
after they got all the useful tech out of them
Adrian Green
TEMPLE OS IS THE KEY
Logan Rodriguez
If you black box your network, you can be on an old unpatched 2000 box and it wouldn't matter. Our intel agencies run under this premise.