User Controls

Intel's Management Engine

  1. #21
    SBTlauien African Astronaut
    Originally posted by Dargo Purchase said machine.

    Would being suspicious work?
  2. #22
    -SpectraL coward [the spuriously bluish-lilac bushman]
    All modern devices have backdoors placed into them by their manufacturers, so that law enforcement can access them at any time. From cars, to planes, to phones, to computers. Don't you worry. If you have it, they've already been there.
  3. #23
    mashlehash victim of incest [my perspicuously dependant flavourlessness]
    ...but I own an Intel.
  4. #24
    SBTlauien African Astronaut
    Originally posted by -SpectraL All modern devices have backdoors placed into them by their manufacturers, so that law enforcement can access them at any time. From cars, to planes, to phones, to computers. Don't you worry. If you have it, they've already been there.

    I don't know if I would be willing to say that they have been placed there purposely, but it sure seems like the are prevalent. With technology changing so much and the addition of new code, I could see it being natural to miss places of vulnerabilities. But then again, I don't know shit.
  5. #25
    aldra JIDF Controlled Opposition
    Almost all of the major harddrive manufacturers colluded with the NSA in building the harddrive firmware module of GRAYFISH - it detects the model and manufacturer of the harddrive currently installed in the computer and builds a compromised firmware that allows it to find, store and transmit sensitive data completely invisible to the operating system.

    It's often glossed over because the technical details and scope are hard for people without a technical background to grasp, but there's no question that the industry helped the NSA exploit their devices - it's almost impossible to write a functioning firmware without examples to work from, detailed schematics and interrupt lists, let alone one that carries out standard functions AS WELL AS functioning as a trojan AS WELL AS doing so without making any calls to the OS or driver.

    The following users say it would be alright if the author of this post didn't die in a fire!
  6. #26
    benny vader YELLOW GHOST
    Originally posted by -SpectraL This is one of the reasons I use old software/hardware. I use a Pentium4 3gHz (2005) dual core CPU.

    me too.

    not becos i want to, but becos this was what ppl threw out.
  7. #27
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by aldra Almost all of the major harddrive manufacturers colluded with the NSA in building the harddrive firmware module of GRAYFISH - it detects the model and manufacturer of the harddrive currently installed in the computer and builds a compromised firmware that allows it to find, store and transmit sensitive data completely invisible to the operating system.

    It's often glossed over because the technical details and scope are hard for people without a technical background to grasp, but there's no question that the industry helped the NSA exploit their devices - it's almost impossible to write a functioning firmware without examples to work from, detailed schematics and interrupt lists, let alone one that carries out standard functions AS WELL AS functioning as a trojan AS WELL AS doing so without making any calls to the OS or driver.

    Another thing they don't want anyone to know is it's also highly illegal and that they could all go to prison for it for a very long time. Good thing federal agencies and crony capitalists are above the law, in practice... for now.
Jump to Top