It says there they are "stopping" with with anti-theft by the Jan 2015. Does that mean they won't be inserting that shit into new CPUs or they just don't offer that service to general public?
So what if it has a backdoor? What can be done with a CPU backdoor? They can turn your PC off..and that it. Big deal. Its not like they can spy on your tranny midget porn fap sessions or connect to your internet or keylog your shit up through your CPU
This is why I laugh when autists say to use things like HTTPS or TOR or whatever to be more 'secure'. The NSA has backdoors in probably every single one of your CPUs and/or hard drives, they could easily track you if they wanted.
as if they use people to track that shit
big data analytics is a big thing now precisely because of stuff like this. not going to bet against mi5 on the off chance I don't get caught in their AI net
You're all fucking retards. You don't need any intel bullshit tech. x86 allows for backdoors since SMM.
Well how do you prevent this? Obviously there is no protection against it that will cover 100%, but how to you minimize your personal data output (without logging off of the internet).
But if these (SMM + Intel ME) are present in ALL microcontrollers (SMM) then what could be done about it?
Make your own (fast) cpu? Yeah, like that's going to happen!
As EVERYONE has this 'cancer' is it not as bad as using unencrypted data transmission or using facebook or using google?
>It's just anti-theft.
>Doesn't mention the actual hardware backdoor in Intel CPU's, known as SMM (System Management Mode), AKA ring -2.
Baka desu senpai.
More people need to know about SMM and it's security implications.
Are you fucking retarded?
They can do literally everything with a CPU backdoor.
Not even virtual memory can stop it, the CPU has access to all physical memory and all devices, there is nothing stopping it from spying on everything that happens on your computer, including storage, network activity, and what's on your screen and every key you type and every mouse movement and the entire memory of the kernel and processes.
It's the ultimate backdoor.
Is it really that dangerous?
If EVERYONE has it, everyone can be hacked?
Cyberwar? NSA <--> Hackers Who would win?
>Atomic power plant in the USA
>using intel processors
>hackers use rootkit
>hacking can be traced to >generic country<
>attack >generic country<
Is it like cold war reloaded?
It's not the issue of "oh my god gun be hacked" because most of people will never be the target of use of this technology.
It's the moral and ethical issue of this technology BEING there.
Would you buy a new car if the corporation making it outright told you that the car has a built in remote killswitch that will trigger in case of car "malfunctioning" (i'm implying very broad term for a lot of things that could happen) for example a required oil change because the car surpassed the manufacturer's recommended mileage since last oil change?
So you can't drive your own car to work despite the fact it's just 3 kms from your place because manufacturer disabled it?
Well ofcourse, but if this happens
maybe like this:
> Intel (Gov. forces Intel) decides to destroy all computers who are viewing DVDs on Linux (in the us it's illegal) or run Linux because it's considered to be "dangerous"
> Incredible amount of linux computers go down
They would'nt do this?
So why would intel (gov.) like to disable the laptop of average joe?
>They would'nt do this?
With current political situation and current lawmakers no. But how do you know what will be the case in the next decade?
While the technology is still there.
Like i said, it's not the matter of it being used, it's the moral and ethical issue of it's existence.
This is my hardware I bought with my own money and despite this manufacturers reserve the right to control it remotely without my knowledge and consent.
>intelligence analysis software flags you mistakenly
>your computer gets locked
>get it confiscated
>maybe you had some illegal software or encryption library
>get busted anyway because they don't want to look like idiots
>tfw fell for the Jews are trustworthy meme
No, but it's not like:
> gov. uses strong encryption, people can't spy on gov.
> gov. makes strong encryption for users illegal, can spy on people.
This is more like:
> backdoored everyone, we're all gonna die
So which CPU's are CONFIRMED to not have fuckery backdoor butt rape FBI/CIA/NSA please rape my ass in a spy fest bullshit?
Just the last ones, so I can build a computer with it on linux with my weird tentacle hentai shit
AMD or Intel is fine, idc
For Intel, the cutoff date is somewhere around 2005-2006, though there has been success killing ME on some 2008 chips. Sandy Bridge is when the ME PCI device was integrated into the processor block.
SMM has been there since i386. Though over the years they have turned it into a monster.
>Implying NSA's BFF GCHQ wouldn't enforce / corrupt ARM-chips just like murrican three alphabet-agencies ( and pretty much every similar agency in other countries ) are doing if they have local chip production.
>But where is it saving this stuff?
>can this cpu break it
Yes, because the CPU has access to your kernel memory, which means it has access to the key, all the backdoor code needs to do is know how to read the kernel memory in order to obtain the key, and with documentation, it's certainly possible.
Since the CPU also has unrestricted access to the network card, it can easily send this stuff over the internet to three letter agencies and your OS wouldn't have a single clue about it, though I guess it would be possible for your router to intercept the packets.
Yes, IIRC the SMM has it's own data section, it can saved it there and send it off to the NSA later.
Think of it like this: if your OS can use it, then SMM can use it too.
Correct me if I'm wrong, but there could potentially be devices in the system that are hidden from the OS (I.E. not mapped into the address space, or kernel not notified of it's existence, undocumented IO ports or chipset interfaces etc), but since SMM code is vendor specific it is probably able to use these hidden devices, though i don't know of how much use that would be, maybe a dedicated surveillance device to aid the SMM backdoor or something.
A) Intel Antitheft is an anti-theft technology built into the motherboard's trusted platform module. The motherboard gets bricked. The processor did not.
B) Intel stopped marketing, selling, and running the anti-theft service over a year ago. They gave anyone with unused time (i.e. me) a refund and shut down the servers. They also are still broadcasting an anti-poison pill that tells the laptops to disable antitheft because the servers are kill.
And to add, the SMM code and data sections are mapped into memory, however it is impossible to for rings higher than -2 (kernel runs in ring 0) to access these sections, the CPU won't allow it unless you're ring -2.
The BIOS sets up a timer to fire periodically which puts the CPU into ring -2 and transfers control to the SMM code to do it's thing and return.
It is also impossible or very hard to actually detect wether SMM is active on the system.
But it's not something that came with my laptop. It's just a thing I bought. It's based on Wimax, though, and I did need drivers to get it to work.
Since it actually handles everything by itself and is plugged in externally through USB, I'm kinda sceptical SMM can even know about its existence or decide to use it instead of a normal network card, but I'm not sure if it can somehow figure this out.
I am a business traveler who averages about 110 nights a year in hotels and 120 flights, so having the ability to remotely make my laptop worthless (and potentially recover it through tracking that would survive operating system wipes) if stolen was something of value to me.
Your operating system can use it yes? there's nothing stopping the SMM from using it either, afterall they're both running on the same chip and one has higher privileges than the other.
The only thing stopping it is knowing how to use the device, if the SMM doesn't have a driver for whatever your thing is, and you don't have an internal network card, then you're probably safe.
There is one way actually, but i wonder if it would work. if the backdoor knows which operating system is running, it could probably use the kernels syscall interface to communicate with the card, but then the kernel knows about it's spying, so i guess not.
It probably doesn't know about it. I mean, how many drivers can you get into that thing anyway? You have to stop somewhere.
Unless these 4G providers are just considered an exception and their drivers are put in anyway. Still, there can't be that much space for drivers on this chip, so it's a question of whether it's cost-efficient when 90% would use their internal network card anyway.
Also, what about custom-built desktops that had both CPU and the network card picked separately?
>It probably doesn't know about it.
No it knows about it, it knows it's there, it's wether it knows how to use it or not is the question.
>how many drivers can you get into that thing anyway?
I don't know the exact or even approximate size but it's probably not that much, it'd probably be hard coded, so it would only work with one type of card.
It probably only works for the card that is shipped with machine, but for machines that don't come with one i guess your safe, same with custom built PC's.
I could be wrong though.