Do any of you care about the fact that all modern micro-processors from Intel and AMD are backdoored?
E.g. Intel management engine allows signed code to hijack every component of your hardware. It's like a segmented, hidden part of the processor solely dedicated towards "updates" and you can't turn it off. So even Linux fags using whole disk encryption are still vulnerable.
What are we going to do, not compute? If what you say is true, they sure as hell wouldn't use it on anything I do. Revealing or using this functionality would be crazy for them to do. And linux with full encryption is still the most secure OS, this doesn't change anything about that.
Lucas Wright
not muh core 2 duo memepad
Chase Butler
>And linux with full encryption is still the most secure OS, this doesn't change anything about that.
"We got your key by watching what you typed through the backdoor. Nice try, faggot." t. Party Van
Carter Butler
>not compute?
Not compute online is the obvious answer.
Ryan Russell
ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf this is also a good paper related to this subject >if no backdoor in your software, compiler probably implemented one >if no backdoor implementing compiler then your hardware probably implemented one
Isaac Reyes
No one cares about what I do. Encryption is not just used to hide illegal activity from your government, faggot
Chase Bell
Not enough to try to do anything about it. >Also, rebuttal to the "but I have nothing to hide" argument: papers.ssrn.com/sol3/papers.cfm?abstract_id=998565 not going to read this now, but thank you for posting something other than a shitty "well what if i wanted to look at your dick?" analogy
Basically, you can compare the output of a bunch of compilers in such a way that any self-replicating features will get detected, so long as at least one complier is clean.
Chase Campbell
too bad amd botnet is even more malicious and you can't do anything about it
Adrian Clark
ME has full and direct access to the CPU, RAM, and thus, by extension, to virtually anything else on the system. Thus encryption obviously isn't a means to prevent it from accessing data, unless the decryption key is never used on that system.
Samuel Hughes
>unplug my computer's ethernet cable
Checkmate.
Austin Hughes
Do you have links to some resources on that?
Grayson Thomas
>so long as at least one complier is clean
This is dumb. If you have a clean compiler you could have used that in the first place...
Jeremiah Miller
>encryption means that the CPU will never access anything during the time I decrypt the drive
I guarantee you're only surviving on buzzwords for now, but you obviously have no fucking clue how this shit works, do you? This also does not help when the encrypted container is unlocked by the machine itself.
Dominic Morgan
libreboot.org/faq/#amdpsp What happens if you disconnect your network, decrypt your shit and reboot your system? I doubt it they can get your key.
Tyler Brown
>linux with full encryption is still the most secure OS LUKS literally put your passphrase in clear text on a file
Colton Price
>added support for AMT out-of-band communication for wireless network with 36/48/54Mbps speed
Thinkpads from 2011 and later presumably all come AMT access over wireless LAN (the x201 from 2010 needed to have the ME firmware updated to enable this).
i can understand people that want to protect their privacy but at some point where does it end if company just backdoor CPU what are you gonna do about it ?
Julian Sanders
The ME is active all the time, even if the unit is in S3 sleep mode. While AMT is the specific part enabling remote access, ME is all-encompassing and always active. Even the OEM mainboard firmware (BIOS/UEFI) is basically just its sockpuppet.
Zachary Miller
>This is dumb. If you have a clean compiler you could have used that in the first place... Not really. Firstly, you don't have to know WHICH complier is clean. So you can try with a dozen and see what happens. Secondly, the "trusted" compiler(s) doesn't have to be practical. It could target an architecture no-one uses, be an antique piece of shit, be horrible at optimisation, or be a built specifically to make infection virtually impossible (and therefore hopeless at everything but this task). They just have to successfully compile the "compiler under test".
This is actually is a bit imprecise, as there were plenty of Core2 systems with integrated ME/AMT on it already, such as the T61(p)/X61, X200, etc. - only the first gen Core2 (Merom) lacks it, that's why he has been using an X60 since ages (if he upgraded after all then probably to a librebooted X200).
Jaxon Campbell
They have to be very close to the machine fir this to work. And absolutely no one with a brain trusts RSA. Irrelevant and not part of my threat model.
Jaxson Evans
>implying the chinese havent backdoored every single component they put on the market
This is so common that the US Govt is starting to refuse to use any components not manufactured or quality checked by US companies with government oversight for DoD purposes.
Kayden Ortiz
I don't think you know what Intel is hint: it's not the government
Michael Wood
this. you have to find ancient/obscure hardware and run it off a battery inside a fucking faraday cage
or you know, just use facebook and masturbate to regular porn like a normal human being
Cooper Davis
>And absolutely no one with a brain trusts RSA. Irrelevant and not part of my threat model.
I guess you should stop using TLS and SSL over the web since 90% of those keys are RSA.
Lucas Thompson
>amd botnet is even more malicious
stallman.org/to-Sup Forums.html >I don't know how much better the current AMD processors are, but they are surely not worse.
Is he misinformed on these matters then?
Isaiah Barnes
Wait, did he publicly visit Sup Forums before?
Xavier Cook
That particular attack would only be used by a govt agency in my case
Jonathan Martinez
No, you don't have to be close. CPUs operate in the range of UHF/SHF frequencies and anyone with a receiver, no matter how far away and with the right equipment and power supply can pick this up. If this were the case, radars would not be able to pick up aircraft that have their IFF off.
No, people email him.
Henry Campbell
Ssl has long been compromised. Tls not so much, but anything I do warrants no attention
Jace Perez
So is it worth buying an older CPU and running libreboot or is that too tin foil hat?
Tyler Howard
So what is the range, since you seem to know all about it?
Jacob Hall
You don't understand. A private company, and many potential workers involved in that backdoor could gain access to you information. The government is one thing, but normal, white & blue collar people?
Oliver Nguyen
How modern are we talking about here?
Would a is 3570k be backdoored?
Jordan Ortiz
> It's like a segmented, hidden part of the processor solely dedicated towards "updates" and you can't turn it off.
This is factually incorrect. If you want to make a genuine argument against something don't exaggerate like you're an 80 IQ teenage sheboon. Unfortunately these sub processors actually serve a purpose in the business world, so much so that if you want to sell a system to anyone they're now required. Everything from laptops, SFF desktops, POS systems, all the way up to server ships. Among other things these sub processors are serving as a more advanced implementation of trusted execution. They're put in place for legitimate security reasons.
You can argue that they're not free as in freedom like you're the autistic communist Richard Stallman, but you can't say that these have no purpose. And as far as the freedom argument goes, most of what your processor does is totally obscured from you.
Xavier Sullivan
Depends on what you do. Doesn't make s huge difference if the network you used is compromised.
Jackson Turner
When it is used in the wild, I might start giving a shit. But again i do nothing that would warrant that attention.
Ryder Cox
Anything post core duo/quad so yes
Brandon Nguyen
>Tls not so much, but anything I do warrants no attention
Anything you do warrants attention under the new doctrines in place. What you search and what you view is building a model of certain kinds of personalities on the web. This is how the NSA develops a threat model and throws red flags for National Security (at least that's their party line). They may not explicitly come after you for doing anything wrong, but they know everything about you and the way your mind operates per your personality model. This isn't about "they caught me doing something bad." This is them building models to exploit people to get what they want, whether it be information or to blackmail to get them to do something for them. Intelligence communities have worked extensively on these programs through PsyOps since the cold war and failed, because they would get caught. It's a lot easier for them to be able to do this now, when people are freely exchanging sensitive/exploitable information about themselves over the web.
Anyone with a directional antenna and a decent power supply to transmit over long distances can eavesdrop. The trick is tuning your antenna to focus in a particular area where you're not going to be picking up conflicting noise from other machines on that frequency. But these technologies have gotten so good over the years that it can be set up point to point almost like a laser. Microwave link technology has perfected this.
Nah, bro. It's one thing we can't have 100% security. It's a differnt story to server them your private data on a a plate.
It's about hardening your defenses, not about 100% protection.
Of course, if a TLA wants your data - I mean specifically YOUR data - there is nothing you can possibly do to be 100% secure. But it's all about mass data, it's all about meta data. So try to get as secure as possible without truning full tinfoil hat. Today there's a lot of information about protecting yourself.
At the end of the day, there are people out there who make decisions. And maybe the difference wether it's 10 millions to get the data you want or it's 10 billion will make the differnce if a big data grab project starts or not.
William Cook
>It's one thing we can't have 100% security. A realistic goal is to have reasonable security. The problem is we might be headed towards ~0%.
Nicholas Morgan
>tfw there's probably side channel attacks for neurons and the NSA can read that I like trap pics
really afraid now, desu
Joshua Richardson
Im very cognizant of that information. Tge government wants a file on everyone since J. Edgar. The government has much, much bigger fish to fry than me. This is still a very remote, implausible situation in my case. Nothing would surprise me about backdoors, but I don't work in a sensitive industry or have any information of value.
Owen Collins
Your thoughts can be read externally. Its just that the signal is too low powered to be read from a distance. If you had sensors strapped all over your scalp they could see what you were thinking. Read the alphabet and they can see the letters in your head as you're reading them.
> The government has much, much bigger fish to fry than me.
This is a faulty line of thinking. The government doesn't have to target anyone specifically. They simply catalog information, and eventually it gets sorted. Sorted information forms a record for every citizen. It is all linked together. Your digital fingerprint, all your credit history, everything about you. Decide to run for office one day and some government agency already has a mile high blackmail folder prepared to use against you. That data is being kept forever, and when government has a resource available they will eventually make use of it. Its only a matter of time, if they haven't started doing it already.
Mass surveillance and data collection itself is a fundamental threat to liberty.
Hunter Parker
The issue here is that the hardware is the lowest in the trust model you could give. You do not have any oversight over the production of the hardware you are receiving on the market and do not know what kind of technologies are being implemented to have remote capabilities outside of your machine. There is no real auditing done on these technologies and there may be real serious exploits with these that security experts are not totally aware of.
It's really a case of, "Don't trust it if you didn't build it yourself." Unfortunately for computing, you cannot recreate these things because of the laws and institutions in place.
>Im very cognizant of that information. The government wants a file on everyone since J. Edgar.
They don't want "you." That would be too much information they would have to manage. They want your template. They're building a database to see how many people really fit or closely match templates. Not only in foreign countries, but around the world. It gives them an idea of what to expect from someone when they have to deal with them. It's kind of a creepy and fucked up way of getting to know someone before you even meet them.
William Fisher
brb getting rid of this machine and replacing it with an ancient dos machine and never using the web again
Jayden Rogers
All you do is tell me why I should be worried. You offer no solution, no new information on the subject, just fear. And to top all that, here you are posting on a Nazi imageboard telling everyone that will listen to why we are all fucked. What I'm doing online is really no worse than 96% of other folks. Sure I agree with your assessment, but offer some solution: stay offline all the time, use cash for everything?
and if the OS is secure, and nobody can remote access the PC then this hardware with a backdoor is not going to let anyone in,
Jaxson Collins
There is some very recent information in the latter two links posted by .
Bentley Gutierrez
For decades people have voted in politicians that campaign on destroying liberty. Everyone loves their chosen conquerors. Put the right coat of paint on any legislation and you can get half or more of the country to support it, no matter what harm it does to them. The damage can be undone the same way it was done in the first place. Vote in officials who will reign in abuses of power, and who take oversight seriously.
The problem is that people get the government they deserve. The majority of people are under evolved tribal animals who associate political parties as their own tribe, so they support them unquestionably. Its not a battle that has to be fought against the government directly. What we have to face is a war on culture itself. Mindsets need to change, the people themselves have to change, or any impact that one or two radical elections have will eventually rebound, and it will return to the mean which is infringing on liberty for the sake of expanding government.
Educate everyone you know. Its your duty.
Lincoln Gutierrez
Its all software based, relax every one.
Something something AMD trust something Intel theft protection something something, You really dont need the internet to survive.
Alexander White
this thread is dedicated to tinfoil asshattery
/thread dead
Ryan Turner
Where is any proof intel and AMD have backdoors?
From my understanding there are encrypted blobs of code that are signed and can't be audited or switched out for your own (since it's signed), which is obviously a POTENTIAL security concern because there COULD possibly be a backdoor in this code, BUT since it's encrypted and has never been audited (as far as I'm aware anyway), there is no proof there are or are not backdoors in place.
The most you can say is there is the potential for a backdoor, however it is always safe to assume a state level actor(s) can get access to your computer and your data, regardless of your security measures and encryption.
If you throw enough money at the problem, it WILL disappear. This includes CPUs without backdoors too, it just takes more sophisticated methods and more time/money.
Jackson Long
It has direct memory access, network stack access out-of-band, and runs unauditable code on practically every meaningful computer in existence. It even implements an entire java vm, millions of lines of code. Tell me that the government wouldn't spend 2+ billion on access to even one 'accidental' vulnerability in this system, if it meant they could invisible own any device in existence.
Hell, that's probably way less than they spend on R&D for exploits anyways
Brandon Jenkins
What you fail to mention is that all parties supported this. You can't play the "you voted them in!" argument when they were both the same.
>Tell me that the government wouldn't spend 2+ billion on access
Well as I said >it is always safe to assume a state level actor(s) can get access to your computer and your data, regardless of your security measures and encryption.
If an entity with that sort of budget wants to know what you're up to, they're going to find out.
I don't care if you built the CPU from scratch in your basement and run your own OS, etc.
Hudson Gonzalez
What you fail to mention is that 3rd parties exist. Both the DNC and RNC are privately owned organizations controlled by a handful of wealthy donors. I did not in anyway push the two party paradigm, your mind is simply stuck there from years of social programming.
Angel Martin
Anyone with half a brain understood the implications of ME. Just like pre Snowden era when anyone suspected that the govt was hacking everything possible. No its not 200% confirmed, the govtt will hang on to the vulnerability as long as possible to avoid disclosure.
Josiah Thompson
Did you even read any of the documentation? If someone has the keys, they can gain access. All the doors are in place, it's not even a secret. It's known what ME/AMT does officially, what isn't known is its undocumented "features", and obviously like in any software, there's bound to be bugs to be exploited if (or rather once) they're discovered. You sound like someone who claims that the existence of the Bilderberg group is just a lunatic conspiracy theory - no it's not, it's official that the meetings take place and who attends, but it's unknown what is being discussed and decided there. That's a vast difference.
Benjamin White
How did the process go for you? Do you have problems with the NIC?
Andrew Gomez
>it's official that the meetings take place and who attends, but it's unknown what is being discussed and decided there. That's a vast difference.
Lol except in this case there has never been a confirmation ME was for a backdoor, sure, anyone in the industry can read between the lines and make an educated guess. But show me literally ANY source that can actually confirm if there is a backdoor.
Logan Long
>all parties Blue and red are not the only colors.
Leo Rogers
Only ones that matter. It's pointless to even begin discussing 'third' parties.
No amount of saying how smart you are (like ) will make anyone change their voting patterns.
Jayden Moore
AMT itself is the backdoor, it's obvious if you know how it works. Whoever either has the cryptographic keys or can exploit a bug can make use of it.
Christian Lopez
>only ones that matter Opinion discarded. Kill yourself. You are the problem with this country.
Julian Johnson
>it's obvious if you know how it works. And how would you know how it works since the code is encrypted and has never been independently audited?
Gavin Murphy
>It's pointless to even begin discussing 'third' parties.
This mindset itself is the problem.
John Cook
>being this defeatist
If SJWs can come out of the woodwork to get social policies changed around countries and a bunch of fat NEETs on Sup Forums can somehow convince the country to vote for Trump, why couldn't you convince anyone to vote for a 3rd party?
Levi Phillips
If ME checksum fails the system will shut down after 30 minutes. The person who wrote that shitty python script obviously never tried it on real hardware.
Leo Powell
Yo, can you give me some sources on these backdoors? I'd like to know a bit more about what chips are and what aren't backdoored, and is it even true that they are backdoored?
What kind of organisations post data on these kind of issues? Wikileaks? White-hat security companies? Universities?
Michael Hughes
You already know its a backdoor in your heart, but you are trying to justify your apathy towards it. Like a German that is convinced their communication was not compromised because they had no concrete proof
Gabriel Lopez
This is fallacious. If no one's reporting on this, that doesn't mean it isn't happening.
David Russell
I didn't even know it would boot, I thought if it detected unsigned code it simply wouldnt boot.
Brayden Gutierrez
The officially documented features and accessible information (whether straight from Intel or obtained via independent research) are more than enough.
Elijah Morris
>You already know its a backdoor in your heart Kek, love the source.
Sorry, I have no arguments that it is probably a backdoor, but fuck off with your CONFIRMED backdoor bullshit, nothing is confirmed you fucking nigger, stop trying to pretend to make yourself feel better.
Michael Perry
>much bigger fish to fry than me.
>what is mass fishing.
No one will single you out and target specifically. It'll be a mass sweep with everyone taken with looking.
Ayden Perez
Lets see the source then bby. Point me at these backdoors publicly being mentioned.
Can't you just physically damage that part of the chip like they cut dies to make lesser chips out of better chips?
Easton Campbell
The 30 minute window is there to let a technician "repair" the device.
Jeremiah Bailey
Stein and Johnson were a joke. Run a plausible candidate with s feasible platform and I might consider it.
Gavin Diaz
repair meaning flashing the proper Management Engine code.
Grayson Long
im a poorfag still using q6600 so lol at u
Samuel Ramirez
No. Like said. The system relies on these components for boot.
Also >cutting into a 14nm chip
I'd love to see someone do this.
Jayden Fisher
It's literally a case of "the only winning move is not to play." That's why so many people protest now by spoiling the ballot, because it's a countable method of protest that's better than not even turning up.
It's true. You can elbow your way through the line to put in your vote for the third party but it's not going to count for anything in the grand scheme of things because you're still playing the game.
Sup Forums didn't do shit. What won Trump the election was promising abandoned people of the rust belt (how does a country happily have an entire stretch of a continent with such a poor name but no help for it?) being told that a vote for him will bring back their dignity.
SJWs win because they have the same school of thought as the Marxists that are our politicians.
Camden Myers
>q6600 Uhhh. The Q6600 has iAMT 2.0
The 2nd generation of AMT.
Jaxson Morgan
Spoiling the ballot as a protest isn't going to make people do anything different. Even if 40% of voters wrote in the same meme it wouldn't matter.