[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

You can never trust a computer: 1. When you use proprietary

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 51
Thread images: 8

File: 1454813739049.jpg (686KB, 2048x1152px) Image search: [Google]
1454813739049.jpg
686KB, 2048x1152px
You can never trust a computer:

1. When you use proprietary software, there's no way to find backdoors in them

>Use free software

2. When you use free software, there can be bugs and also well hidden backdoors
(read Trusting Trust)

>Write your own software then

3. The library you link to may be compromised and even the compiler may add something malicious.

>Don't use the libraries then and write everything in assembly

4. The assembly code you write will use system interrupts, which again can have malicious code.

>FUCK YOU WRITE EVERYTHING IN MACHINE CODE

5. You can't trust the ISA of a CPU, because it may contain hardware backdoors which make machine instructions that you call do something malicious except the operation you wish them to do.

>DESIGN YOUR OWN HARDWARE FROM SCRATCH AND GTFO

6. Then you will have to fabricate your CPU somewhere and there may be an enemy agent injecting modifications to your CPU in the complicated fabrication process that has many steps.

There's nothing to save us, /g/. Information security doesn't exist, we're doomed.
>>
File: 1454706111793.jpg (275KB, 1000x1500px) Image search: [Google]
1454706111793.jpg
275KB, 1000x1500px
bump
>>
File: 1454812277662.jpg (162KB, 1280x852px) Image search: [Google]
1454812277662.jpg
162KB, 1280x852px
Anyone?
>>
I remember /g/ used to discuss botnets all the time, what the fuck happened?
>>
File: 1453853328802.jpg (273KB, 960x686px) Image search: [Google]
1453853328802.jpg
273KB, 960x686px
>>
>>52963405
Noice
>>
Pen and paper
>>
>implying open source software doesn't have the same backdoors

They just change those snippet's text color to transparent.
>>
>>52963456
Damn that looks cozy as fuck.
>>
>>52963361
but it never existed?
Maybe with analog equipment, but thete was no encryption as strong as pgp, so?
Hardware security (big steel shed, vault) is still best!
>>
>>52963487
Turns out the botnet was good in bed, and seeing as the majority of /g/ are virgin autists, they just let the botnet fuck their boi pussy
>>
File: 1454350951458.png (57KB, 500x500px) Image search: [Google]
1454350951458.png
57KB, 500x500px
>>52965246
> majority of /g/
wtf?
I thought the majority of /g/ were arch using ricers + gentoo (i know both of them are meme, so frog?)ebin
>>
>>52963361
>5. You can't trust the ISA of a CPU, because it may contain hardware backdoors which make machine instructions that you call do something malicious except the operation you wish them to do.
This one is true. Does anyone have the link to the article someone wrote about Intel doing this?
>>
>>52963456
This thread didn't work out because it was one of the millions iShill vs Lagdroid or other futile threads.
>>
File: 1432427984539.jpg (86KB, 651x940px) Image search: [Google]
1432427984539.jpg
86KB, 651x940px
>>52965291
>>52965291
Why do you think arch users / ricers aren't virgin autists. Don't they go hand in hand?
>>
AMD is your friend. Literally no backdoors.
>>
you can counteract trusting trust https://www.schneier.com/blog/archives/2006/01/countering_trus.html
>>
>>52965374
what
the
fuck
is
pic related
>>
>>52965422
really? I don't know ... why would the not do the same as intel?
>>
>>52965449
Watch it, it's bretty gud: https://www.youtube.com/watch?v=XcySXoQLI5Q
>>
>>52963361
I don't trust my computer, I trust my hardware firewall.
>>
File: bmow.jpg (52KB, 400x300px) Image search: [Google]
bmow.jpg
52KB, 400x300px
>>52963361
>not wiring your own cpu
stay pleb
>>
>>52965512
Hello, Ahmed.
>>
>>52965320
Bumping my own request
>inb4 >>>/wsr/
>>
File: :).png (65KB, 480x359px) Image search: [Google]
:).png
65KB, 480x359px
saving this thread
>>
>>52964125
>>52964728
It's from a cozy thread. I don't have any /g/ pics at the moment.

>>52964667
Inconvenient for photos, audio etc.

>>52964718
yeah...

>>52964879
>>52965246
>>52965358
You're right.

>>52965320
Adam Waksman wrote a phd thesis about hardware backdoors in CPUs, it's available on his homepage.

>>52965422
Because they sold their HQ, so they really have no doors, no windows, no anything. Good point.

>>52965505
Have you verified that your hardware firewall's integrated circuits really do what they should?

>>52965512
It's inefficient as fuck to process important information using such hardware.
>>
Anon go put your tin foil hat back on and sit in the corner.
>>
>>52965731
fuck no! i don't have a corner!
>>
>>52964879
I get a feeling you're mootwo, he writes in a specific way just like you.
>>
>>52965483
Thanks senpai. Actually only had the picture, hadn't seen the film but it's pretty sick dude.
>>
>>52965739
Just move your mouse to the corner of the screen.

It's the same thing for autists.
>>
>>52965754
Hiroshima has broken English and half his sentences don't actually make sense.

It can't be him.
>>
>>52965845
>Hiroshima has broken English
I have bad news for you...
>>
>>52963361
>1. When you use proprietary software, there's no way to find backdoors in them
reverse engineer it

>2. When you use free software, there can be bugs and also well hidden backdoors
>(read Trusting Trust)
well write your own then

>3. The library you link to may be compromised and even the compiler may add something malicious.
welp

>4. The assembly code you write will use system interrupts, which again can have malicious code.
well yeah but so what

>5. You can't trust the ISA of a CPU, because it may contain hardware backdoors which make machine instructions that you call do something malicious except the operation you wish them to do.
I haven't seen an ISA slot in years didn't PCI replace that shit wasn't it only 8 bit or something

>6. Then you will have to fabricate your CPU somewhere and there may be an enemy agent injecting modifications to your CPU in the complicated fabrication process that has many steps.
are you crazy designing a cpu is very hard

I'm sorry what was this thread about and who am I quoting

>There's nothing to save us, /g/. Information security doesn't exist, we're doomed.
Oh.
>>
>>52965939
>I haven't seen an ISA slot in years didn't PCI replace that shit wasn't it only 8 bit or something
/v/ everybody
>>
>>52963361
Use proprietary software. Windows 10 and chrome and shit. Embrace BOTNET. We join them.

Do not be afraid. Assimilation will start few centuries from now.
>>
>>52963456
>>52963361

Keep posting cozy shit like this.

I don't care about your stupid code, though.
>>
>>52965939
>reverse engineer it
Did you read on Trusting Trust?
Here, for you lazy ass: >>52965435
>>
>>52963456
Post more of these photos>>52963456
and this>>52963361
>>
>>52963361

I guess you'll have to stop using computers then.

If you would like to join the other 99.9% of us that don't have some conspiratard bullshit plugged up our assholes, we will be constructing cities and fusion reactors in the time being.

Have fun with your memes.
>>
>>52965483
was laughing at first but holy shit that's really fucking deep
thanks for the link
>>
>>52965691
>It's from a cozy thread
Link to the thread in the archive pls?
Which board was it in?
>>
>>52963361
>>52963405
>>52963456
>>52965691
>>52970094
http://fgts.jp/_/search/image/za4tZq6oiKwpL6ewi_cN6A/

Which one was it?
>>
Or you can just blacklist the botnets on your connection
>>
>>52965483
Looks like a Harmony Korine movie
>>
>>52963361
> 5. You can't trust the ISA of a CPU, because it may contain hardware backdoors which make machine instructions that you call do something malicious except the operation you wish them to do

Well, you can verify that an instruction works as intended. If you know what a CPU does, you know what your software does as well. This also applies for more complex mathematical routines.
You can for instance create a crypto routine and verify its output. If it's correct, you can expect it to work correctly everytime.
>>
>>52971485
How do you know that nothing is sent to NSA by your hardware?
>>
>>52971553
Intercepting traffic on a hardware level is really easy.
>>
>>52971566
Except if the hardware you use to intercept is corrupted too.
>>
>>52963361
Paper, books, old computers, consoles and phones, MP3 players, faraday cages.

Your well came.
>>
>>52965512
'mire my point-to-point handwired botique build
Thread posts: 51
Thread images: 8


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.