[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Debugging mechanism in Intel CPUs allows seizing control via USB port

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 15
Thread images: 2

File: 1468440037752.png (41KB, 416x234px) Image search: [Google]
1468440037752.png
41KB, 416x234px
https://www.scmagazine.com/debugging-mechanism-in-intel-cpus-allows-seizing-control-via-usb-port/article/630480/?

Yet another NSA backdoor found.

You just need to access to a USB 3.0 port.
>>
(((Intel)))

Found your problem.
>>
>reported to Intel

Working as intended, won't fix.
>>
How do those work anyway? I plug in my Super Intel Universal Serial Bus Mass Storage Device and it just boots into os without asking for password? Or is there a total commander in every intel chip hat would allow me to steal user data?
>>
>>58422879
JTAG
>>
>>58422879

There's another low level CPU running in ring zero alongside the Intel host chip. It's invisible to the intalled OS and has complete access to the host CPU, memory, storage and data.
>>
>"As of today, this mechanism can be exploited only on Intel U-series processors.”
>>
Kaby won't have this problem.

Another reason to upgrade your machine.
>>
>>58423026
It only works on U processors from the 6xxx series currently, so literally not an issue.

Not sure if kabylake U series have it as well, but even so, not a big deal for 90% of people.
>>
>>58422931
If the data was encrypted would it be able to decrypt it?
>>
>>58423713
Not if you're using a TPM or a USB key + pin setup.
>>
>>58422942
It's a big exploit.
>>
>>58423779
That only works on ultra low power mobile and NUC CPUs.

So desktop users are 100% unaffected and high powered laptops are equally unaffected.
>>
>>58422829
>need to access to a USB 3.0 port
I couldn't care less about any sort of bug that requires physical access to the machine, because if anybody other than you has physical access to your machine you don't have any real security.
>>
>>58423779
For you
Thread posts: 15
Thread images: 2


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.