Is it truly possible to escape the botnet when everything is backdoored at the hardware level these days? What difference does, say, running Linux make when the NSA can just tap into the backdoor in my CPU and gain unrestricted access to all my hardware?
Use a CPU without PSP and IME
All the older processors don't have them.
There is also a tool for removing IME on github, but you need special tools to flash your CPU.
>>62076912
any youtube vidz about this?
>>62076895
Nothing to hide, nothing to fear.
>>62077047
>oy vey, join the botnet goyim
>>>/out/ shill
>>62077047
Post your internet history then.
>>62077158
and what if my internet history contains nothing illegal?.
>>62076999
YouTube is also a botnets, so no links for you.
>>62076895
Stop using the internet dipshit.
>>62077215
Then we will have autistic fits
>>62077215
Then you should have nothing to fear
stop using the internet.
>>62076895
You're conflating dragnet and targeted surveillance. If the NSA is targeting you in particular, then you're fucked regardless. These are the guys who got a virus onto a carefully secured, airgapped centrifuge control machine. But it's entirely possible to defend against NSA/Google/Facebook dragnet surveillance. Ad block, NoScript, HTTPS Everywhere, encrypted chat and email, etc.
>>62076895
Use any hardware that can be librebooted to avoid hardware backdoors.
I guess RISC-V might be the next logical step for people who are afraid of these things.
>>62076895
cut the cord
>>62079210
>In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level, and we evaluate their impact on the security of the target device. Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including fine-grain optical inspection and checking against “golden chips”. We demonstrate the effectiveness of our approach by inserting Trojans into two designs — a digital post-processing derived from Intel’s cryptographically secure RNG design used in the Ivy Bridge processors and a side-channel resistant SBox implementation — and by exploring their detectability and their effects on security.
http://ei.rub.de/media/crypto/veroeffentlichungen/2014/07/03/BeckerChes13.pdf
>>62077047
Send me nudes, gimme your home keys.
>>62077047
Share your internet history, show us your social pages, take a screenshot of your recent emails, dump chat logs from skype or other IM software.
That's basically nothing, big corporations already can access this data.
>>62077215
>mfw intelligence services havent needed any cause to detain anyone for infinity since 9/11
maybe we'll be roomates in the same mass grave
>>62076895
Metainformation is way less on ghanoo slash linux. We have a bunch neckbeards and programmers, few million pedobear and some non tech illiterate terrorists. hw level backdoors is only good if they have a decent profile about you. W10 gives it, obongo and other shit loonix and bsd don't. On mobile it's pointless tho, but you are a retarded brainlet, so don't mind it.