CTS is a confirmed scammer scum

seekingalpha.com/article/4157242-amd-cts-labs-story-failed-stock-manipulation
>Dan Guido, the CEO of Trail of Bits, the ***(((one and only company hired by CTS to double check their findings***)))
This is it, folks. Guido was fully confirmed for being utter fucking trash of a liar, who was bribed to make this SCAM seem any legit (it's not even in the slightest, the "13 flaws" don't exist on AMD, it's an utter fucking LIE). From this point on, if any and every of you autistic Intbecillic pieces of shit brings "Guido" as an """""argument""""" - you're automatically BTFO'ing yourselves.

Repost these news in as many outlets/forums/blogs/comment sections/reddits as you can, mateys. CTS is a fucking ponzi scammer and Guido is a bribed LIAR.

Attached: 689868986.png (960x540, 2.97M)

Other urls found in this thread:

reddit.com/r/Amd/comments/84cbtr/ctslabs_turns_out_to_be_the_company_that_produced/
amdflaws.com.
blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/
twitter.com/dguido/status/973628511515750400
twitter.com/aionescu/status/974028647307849730
seclists.org/fulldisclosure/2018/Jan/12
twitter.com/SFWRedditImages

>We have attempted to contact Jessica Schaefer from Bevel PR, the listed PR firm on the vulnerability disclosure website, only to be greeted by a full voicemail inbox. We attempted to contact both Bevel PR and CTS Labs by email and inquire about the relationship between CTS and Viceroy, and provided them with ample time to respond. They did not respond to our inquiry

>So, let's look at Viceroy Research. According to MoneyWeb Viceroy Research is headed by a 44-year-old British citizen and ex-social worker, John Fraser Perring, in conjunction with two 23-year-old Australian citizens, Gabriel Bernarde and Aidan Lau. I wonder which of these guys is so fast at typing.

>After successfully taking down Steinhoff, they tried to manufacture controversy around Capitec Bank, a fast-growing South African bank. This time it didn't work out so well. The Capitec stock price dropped shortly and quickly recovered when the South African reserve bank made a statement that Capitec's business is sound. Just a week ago Viceroy attempted to do the same thing with a German company called ProSieben, also with mixed success, and in alleged breach of German securities laws, according to BaFin (similar to the SEC). Now, it appears they are going after AMD, though it looks to be another unsuccessful attack.

SHUT UP

Attached: 1492855909643.png (1228x1502, 944K)

i think they were successful in every case that the target's stock dropped, and they could buy stock in the dip and resell after it recovered

Attached: SMUG MAMA.png (777x656, 355K)

Unleashing a payload like this is meant to 'destroy' a stock, 25-30% drop in price at the minimum, with it snowballing to a 40% drop once investors and shareholders panic. What we saw with AMD was a 1.8% drop with hasty recovery. Which is a normal day trading for AMD.

CTS's mistake here was believing AMD's stock behaves the same on the market that any other company's does. Where it most certainly does not.

If their true end goal was to short the unholy fuck out of a semiconductor stock with security flaws, then Intel would have been a better target while customers and experts are still reeling from news of Spectre and Meltdown, and the dubious fixes put in place for both of them.
But we know their goal was not to short 'any' semiconductor stock, but to try to cripple AMD's reputation ahead of Zen+ this month.

They weren't successful one slightest bit. AMD's stock actually ROSE when these FAKE NEWS came through. The recent drop is NOT due to these LIES, but due to Broadcom/Qualcomm deal rejection and NAND power outage news coming through and sizzling slowly. They're not the ones who were affected by this, Inturd and noVideo lost shares too. AMD already rebounded this Friday.

>When the news outlet that exists only to manipulate tech stocks calls out the Jews for manipulating tech stocks

Fucking wew
Hope those Israelis get the rope.

The most funniest thing about all this is the fact that they're now investigated by SEC and literally everything they did is now coming back biting them in the ass, eventually and absolutely inevitably also striking at Intel as it was the very obvious contractor of this entire plan to begin with. Intel will have the worst repercussions.

Attached: bce43b1b150c771d39feace755bbfcd59d0340d582a9a64cec26126eadd4fd36.png (680x377, 144K)

SEC can't touch Viceroy. Commonwealth citizens. So unless they have holdings in the US that's a deadend that only helps to sour the name.
As for CTS, this mystery firm based in Isreal, do we even know who's name is at the top? Their websites were all setup by proxy, all hosted on godaddy, no "real" contact information provided, just a phone number for an office unit in Israel somewhere and an email. So unless they expect to find an American citizen at the top of it they can't really do anything there either.

If leads point to Intel, then it'll go to federal court? (Not an american, not sure on the procedure there) where Intel will likely do the same they have done in the EU for years, and just call miss-trial after miss-trial while burying parties involved in paperwork and in the end just "forgetting" to pay any fines.

>SEC can't touch Viceroy
Except the fact that they've already got German police on their asses due to a failed scam attempt in that country, so SEC can easily work through Interpol requests.

Interpol are famously slow at accommodating americans. And they likely won't hand over people they're looking to go after for the same shit. Why give the SEC the credit when you can have it right?

If Perring is in the UK, then he's done for fairly quickly, even on our way out of the EU we're still interesting in remaining a part of Interpol and sharing information.
As per Bernarde and Lau in Australia, then god only knows. They likely won't go to trouble of inditing them and dragging them off of a prison colony just to dump them in prison. Whether Australian authorities will have any interest in probing their ass's is a different question, but being in that all of this is their failed attempt at stock manipulation, preceded by 3 other failed attempts, then they're nothing worth worrying about. A different matter if that South African bank did fail though.

Attached: 1521219987575.jpg (940x672, 201K)

We'll just tell them Viceroy said unkind things about Islam.

reddit.com/r/Amd/comments/84cbtr/ctslabs_turns_out_to_be_the_company_that_produced/
OH SHIT, SON

Attached: l9iUm9e.png (1002x1120, 532K)

this is it? thats the power of Mossad? lmao

Where are the proofs these are """americans""" any, even?

[oy vey echoing in the distance]

There isn't any.
Hence here () I say
>As for CTS, this mystery firm based in Isreal, do we even know who's name is at the top? Their websites were all setup by proxy, all hosted on godaddy, no "real" contact information provided, just a phone number for an office unit in Israel somewhere and an email. So unless they expect to find an American citizen at the top of it they can't really do anything there either.

We don't know who's at the top.
Though according to the linked reddit post () claims the images for CTS's website are hosted on a personal google drive, which could well lead somewhere to identifying just who's behind all of this.

Attached: fb6ec38a6558476e8596435f1c6c3b63[1].png (873x377, 38K)

>CTS's mistake here was believing AMD's stock behaves the same on the market that any other company's does.

There is nothing special about AMD as a company to make it more resistant (or even more volatile) than any other company of their size.

I just hope they'll get caught and apprehended fast enough. Either way this already plays big in AMD's favor (literally tons of people will gladly and absolutely deliberately shun away from any and all Inturd's pooducts, just because of this alone already), so no worries on that front.

>(literally tons of people will gladly and absolutely deliberately shun away from any and all Inturd's pooducts, just because of this alone already
That will only be the case if Intel are where the trail ends.
As it is for the moment the data centre customers have been looking to drop Intel on their asses for years because of their segmentation and price hikes for basic features. now suddenly EPYC offers ALL features across the entire, and importantly small, range of products, and EPYC products are considerably denser, meaning no more costly construction work on data centres to expand, now just replace racks and suddenly 33% more compute in the same space.

There literally is.
AMD is currently a literal equivalent of same kind of a deity that modern Russia represents. It may look like an underdog, and you try to ruin it's economics by pressuring it with BS sanctions - but it only becomes stronger and better because it doesn't break or bend under the said pressure rather than just bounces back like a rubber band or a spring and thus raises higher. AMD is exactly in the same kind of a situation right now. Each and every garbage BS FUD shit Intel tried to produce against AMD throughout the entirety of 2017 and now keeps on doing in 2018, only ends better for AMD.

>That will only be the case if Intel are where the trail ends
You seriously have to be abso-fucking-lutely retarded of a reality denier to not believe Intel has it's shit-smeared hands knee-deep in this scam's asshole. It's almost like some people have memory, ya know?

Would Intel have benefitted from all of this? Yes. Absolutely.

But is it also possible, that a financial analysis firm known for market and stock manipulation and outright fraud, acted on their own to acquire a large number of AMD shares via sub holdings and then aim to short and buy more up ahead of Zen+ and Zen2, and reap the financial rewards? Yes, even more likely.

Intel, despite recent events, would not let something so poorly produced be their downfall. While all signs do point to Intel being the source of this, it is all circumstantial evidence. All just good timing.

Even if Intel is innocent it will be always suspicion.

>on their own
>more likely
Not after this pic-related. If they'd kept silent it would've been one thing, but they just couldn't handle the excitement and adrenaline, and fucked everything up by essentially admitting they're involved.

Absolutely.
When a market is held in duopoly, anything that harms the competitor will put the other party under immediate suspicion and scrutiny.

Now, I was about to bring that slide up actually.
Did Intel reach out to GamersNexus and offer statement? Or were Intel questioned about the "flaws" by Gamersnexus, and likely in the same call/email chain asked about the possible source of all of this?

They were the ones who jumped the gun and thus fucked everything up. A literal fucking knee jerk.

I watched that GN video, and they reached out to Intel. What you're saying here is that Intel saying they were not involved shows that they were involved? This is not how the real world works.

>Intel saying they were not involved shows that they were involved?
Exactly.

>This is not how the real world works
Jew, plz.

Innocent until proven guilty.
My only reasonable response to this post would just be a copypaste of this ()

As reckless as Intel have been, shooting themselves in the feet with bad press and press releases, even with how they handed Spectre and Meltdown, they are smart enough to not try something like THIS.

the guilty intel narrative is better for the fun posting but otherwise i agree

Did anybody watch the security now on this? How hard did they chug the coolaid?

>Innocent until proven guilty
Intel fucked up royally a lot of times in the past, being caught by the hand directly, so no, the don't get the benefit of a doubt anymore. Just like was said previously - some people have memory.

Attached: leave-muslims-alone-youre-hurting-them.jpg (500x281, 29K)

Actually in this case Intel might not have been involved. One of the reasons being that this was executed so poorly.

>Viceroy Research
seriously this is their paper called "AMD Obituary". If I didnt know better I would say this was just some shitty fucking Sup Forums troll. In fact the more I read it the more I realise that is exactly what it is
viceroyresearch.org/2018/03/13/amd-the-obituary/

CTS Labs, a cyber-security research firm, released its findings on amdflaws.com. These findings demonstrate that AMD’s key products, and it basis for profitability and growth, the EPYC and Ryzen processors, contain severe and pervasive security flaws that put users and organizations at an unacceptable and damaging risk. We understand that these flaws are difficult, some practically impossible, to patch.
We believe that AMD was compelled to release products as quickly and cheaply as possible as it was falling behind its competitors. This has led to what appears to be complete oversight or negligence of security fundamentals of AMD’s products, which promote an evidently misguided competitive advantage – particularly with its Secure Processor (a.k.a. Platform Security Processor or PSP) – of providing “the greatest peace of mind on every AMD product.”. Nothing could be further from the truth.
Viceroy, in consultation with experts, have evaluated CTS’s report. We believe the issues identified by CTS are fatal to AMD on a commercial level, and outright dangerous at an international level.
In light of CTS’s discoveries, the meteoric rise of AMD’s stock price now appears to be totally unjustified and entirely unsustainable. We believe AMD is worth $0.00 and will have no choice but to file for Chapter 11 (Bankruptcy) in order to effectively deal with the repercussions of recent discoveries.

Attached: 1520454774542.jpg (280x400, 21K)

hey shutup you fools. It's just the NSA's way of saying "fuck you crypto-soy-boys" ! you lot are blowing the whole thing they could have traced a lot of crypto currency deals by using this and now you never gonna know if they patched things up or not

damn you guys should realise when to BTFO

delid dis

....huh?

this guido dude got rekt

Big-time.

That's a terrible analogy.

>harsh truth of reality is terrible analogy
Liberast cuck, pls.

>anyone who's against me is liberal
Spoken like a true cuck. Your hyper partisanship clouds your thinking that makes use of anything beyond simplified talking points.

>>>>> /po/. Now. GTFO now. Right now. Stop embarrassing yourself any further here than you're already embarrassing yourself right now. Go make an embarrassment out of yourself in the shitboard where you belong.

Even if Zen 2 comes with Meltdown and Spectre, I will buy it over Shilltel.

They've already patched Spectre in Zen+, and Meltdown is simply nonexistent on AMD due to the very architectural structure of Zen (Meltdown can be done only and ONLY on monolithic core package builds. Inturd is an example. Zen is not monolithic in the slightest).

bump because I hadn't seen this thread and don't want it to die

Sup Forumsood Sup Forumsoy.

pastebin? I don't want to create an account

>However, in order to deploy this vulnerability the attacker would have to first get access to the computer, then gain root or administrator privileges, and then finally have the ability to flash (update) the BIOS on the computer. With that level of access it's hard to imagine what an attacker would NOT be able to do on any modern computer system, whether from AMD, Intel, or any other company.
AFAIU (not much), you are not supposed to do this, because the integrity of said files is expected to be checked in the secure processors themselves.

>and a copy of a signed driver with the exploit code inside the driver.
>Though actually executing this vulnerability in the wild would entail finding a friendly OEM willing to sign your malicious code and include it in their drivers, this is not entirely outside the scope of possibility.
>Fallout uses the same attack vector of a signed driver as Ryzenfall, but on an EPYC processor

the paper says
>Accessing the Secure Processor is done through a vendor supplied driver that is digitally signed.
not sure where seekingalpha got the driver signing part. they could have found vulnerabilities in the drivers themselves, and, in fact, Dan Guido seems to confirm this (from blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/ ):
>The FALLOUT and RYZENFALL vulnerabilities exploit the PSP APIs to gain code execution in the PSP or the SMM.

but yeah, there is no clear technical evidence in the whitepaper, no PoC, nothing... only the whitepaper and some level of confirmation by Dan Guido and Alex Ionescu:
twitter.com/dguido/status/973628511515750400
twitter.com/aionescu/status/974028647307849730

>inb4 Sup Forums attacks the messenger
calm down fags, I myself own a ryzen CPU. this interests me because I work in the infosec industry...

oh, and btw, the trailofbits blog links to this:
seclists.org/fulldisclosure/2018/Jan/12

More than that. Intel has shown many times that they aren't above using scummy Jew tactics to fuck up AMD. Just this year Intel shills went full force trying to implicate AMD in the meltdown disaster.

Why are Amd cucks so delusional? Muh conspiracy, Muh stock manipulation. Buy a real CPU with less flaws, poor panjeets.

Holy shit could they be more transparent?

Attached: trolling.png (755x1255, 29K)

Attached: 1486816070397.png (800x612, 234K)

Exactly.
Intel themselves, went out of their way, to explicitly state that AMD were vulnerable to spectre AND meltdown, while only the latter was true.

Intel have so much more up their sleeves to need to resort to such base tactics as false security reports, which, to those able to fucking read, would also imply Intel are vulnerable to the same "exploits" or "flaws".
As of the moment, as golden an opportunity it seems to put Intel to blame here, I fully believe that this is of Viceroy's making. They are firm known for spreading outright falsehoods in an attempt to crash stocks on shear market reaction alone. And have done so in the past. This kind of payload, and the fact that they were ready with a detailed 32-page analysis of these flaws, just seems to put them in the right picture.

>to explicitly state that AMD were vulnerable to spectre AND meltdown, while only the latter was true
Um, former.

They sure can't talk about how good their products are, as they are still full of security flaws and still overpriced, overheating trash in comparison to ryzen. So all they can do is talk shit and spread FUD about AMD.

Correct.
My own stupidity tripping me up there.

They are vulnerable to both, just not as badly as intel.

AMD are "immune" to meltdown, their arch just doesn't allow for meltdown to happen.

Yes, we knew. But what was their end game? price manipulation of stocks?

>So all they can do is talk shit and spread FUD about AMD.
All they can do, all they need to do, and all they can get away with. They don't need to go via an ill-reputed analyst and stock manipulator to do it.

Even in the case of spectre, the AMD exposure was far less than the intel exposure. For type1 spectre, AMD was only exposed with a non-default setting enabling the BPF JIT engine, which on Intel can't be disabled so always vulnerable.

For type2 spectre, AMD exposure was a process being able to read any page in its own memory, enabling for example a browser JS engine to read the browser passwords. On Intel this was far worse and enabled the same to read any memory of any process.

Absolutely horrific flaws on Intel, only a total moron would defend that sort of incompetence.

Unclear.
If there is a "customer" here, then the end game could be to create financial instability in AMD, but considering AMD's position in the market right now it would take more than one half-assed whitepaper and some money thrown at hastily put-together websites to do that.

If their end-game was their own financial gain, then just crashing the price of shares would be enough, they buy them up, hold them until AMD recover, then dump.

At least the AMD patches won't severely reduce performance. Hell, that hasn't really been the issue so far with Meltdown patches - it's having them actually work without breaking the computer. Since this has been happening the patches have been sparingly applied. The way they've handled that is still an ongoing disaster.

That's exactly what they need to do. The recent announce was all lies, and all it needed to do was get the headline out there. Now plebs actually believe that AMD is full of flaws and Intel sits back and washes their hands of it.

There's 1 firm announcing that they're vulnerable, and 400 others calling stock manipulation. Even the most inbred day trader will call manipulation.

News like this never hits public ears.
Spectre and meltdown did because they were real, because they are dangerous, because of the threat they posed to businesses and to people in general.

Even look on Sup Forums now, any Sup Forumsirgin uneducated enough to post the article thinking it's real gets BTFO'd in seconds with multiple replies all linking credible sources calling out CTS and viceroy on stock manipulation.

>also striking at Intel as it was the very obvious contractor of this entire plan to begin with

You think? this act was very stupid, i honestly don't think Intel is behind it

because they're salty poorfaggots

Well it backfired of course, which was always a risk and why intel did their jewry at arm's length. Now they can just rub their hands of it.

Honestly. I am 100% convinced that this has nothing to do with Intel, it just seems too perfect to put them at blame here, my posts through this thread explain my rational well enough for my liking.

This entire thing just feels like it's been done by a handful of individuals with no real instruction. If Intel were involved they would have had much tighter control of the situation, that's for sure.

Fuck off this is all standard jew plausible-deniability bullshit. It has intel all over it, the timing just when Zen+ is coming and notably, just when Intel finally sharted out the fix for spectre months late.

>Spectre
not the person you are quoting, but do you actually think people stopped buying intel procs because of that?

Probably not, but Intel is coming up to their Q3 financials which is what actually matters to jews.

and yet intels stock has steadily climbed, and amd's has always been rocky and wasnt even affected by this 'whitepaper' which no one has ever heard of

the only shills here are the fucking faggots trying to push this retarded seeking website, this entire thread is full of people trying to act like they have a personal investment in a fucking cpu company whether it be one or the other.

you are a tool, and obviously are not from this board

I can hear your hands rubbing together from here.

not an argument. you are probably just a shill for this no-name website who is trying to leech of a no-name report that nobody has read

keep fighting those adblockers shill

I wonder who's behind this post

Attached: six lines.jpg (249x204, 3K)

not an argument. form a thought for a change you shill, its funny looking at the archives for this website and its full of shill OP's following the same format.

go back to whatever board you came from

I remember that amd said that they weren't affected by spectre and shitdown, why did they lie?

I haven't seen any proof that the vulnerabilities do not exist.

The company is shady af and might be trying to destroy AMD due to money or other interests but I still haven't seen any actual evidence that it's fake.

If you can get physical access to a system to flash the bios you are FUCKED - there is no defense against this regardless of hardware. Every cpu in existence is vulnerable to this - but if you can do that then there are bigger problems. The main point is you cannot do this remotely which is means said vulnerability is pointless.

They exist, they are motherboard vulnerabilities which affect intel as well. Pretty jewy.

you can't prove a negative
anyway, some people have confirmed the vulns, but they are far from meltdown/spectre-level, one of them isn't even the responsibility of AMD, and even seem to affect Intel mobos, too

it doesn't matter - privilege escalation exploits are found all the time and can be used in conjunction with the vulns found by CTS. AMD should put out a statement to clear the air and work on getting a patch out instead of this sketchy paid shilling damage control bullshit.

>AMD

Blame Asmedia. Note this same exploit works on Intel as well. In the real world any exploit that relies on physical access and permission to flash bios (remember: these are digitally signed yo) is no exploit at all - anyone in a position to do both of those things might as well unplug the computer in question and walk out the building with it.

I think it has more to do with their being a duopoly and the other guy was just shown to be worse a couple months ago. He's right, your Russia analogy makes no sense.

>I haven't seen any proof that the vulnerabilities do not exist.

Attached: Shekelshuffle.webm (320x240, 2.95M)

I think it could go either way. I can see a situation where Intel might have even commissioned the research in good faith - perhaps they were genuinely concerned about chipset vulnerabilities in general, maybe they were specifically concerned about ASMedia components - and CTS ran rogue with the information and colluded with Viceroy after the fact for the purposes of stock manipulation. The wording of their 'denial' is definitely suspect. Their having 'had no involvement in the CTS Labs security advisory' doesn't literally preclude their having ever worked with them. That kind of careful jew wording is exactly what they employed to obfuscate their unique susceptibilities during the Meltdown disclosure, so I wouldn't put it past them. The chances of it being a centrally coordinated FUD operation in preparation for Ryzen 2000 is much less likely IMO. It's just too stupid, even for Intel.

You totally drink the Russia koolaid, haven't you? Reminder that Russia is a tiny country with the economy of Belgium.

> Reminder that Russia is a tiny country with the economy of Belgium.

Attached: essential guide to stalkan.png (599x631, 356K)

>my entire life is at stake due to news about a company I don't work for and don't hold any stock in

TOPViv

Attached: 2b64b420-8352-4c8a-aeeb-63f002ce2b46..png (499x641, 337K)