User Controls
Intel's Management Engine
-
2017-07-23 at 1:20 AM UTC
-
2017-07-23 at 1:45 AM UTCAll modern devices have backdoors placed into them by their manufacturers, so that law enforcement can access them at any time. From cars, to planes, to phones, to computers. Don't you worry. If you have it, they've already been there.
-
2017-07-23 at 3:32 AM UTC...but I own an Intel.
-
2017-07-27 at 2:30 AM UTC
Originally posted by -SpectraL All modern devices have backdoors placed into them by their manufacturers, so that law enforcement can access them at any time. From cars, to planes, to phones, to computers. Don't you worry. If you have it, they've already been there.
I don't know if I would be willing to say that they have been placed there purposely, but it sure seems like the are prevalent. With technology changing so much and the addition of new code, I could see it being natural to miss places of vulnerabilities. But then again, I don't know shit. -
2017-07-27 at 2:49 AM UTCAlmost all of the major harddrive manufacturers colluded with the NSA in building the harddrive firmware module of GRAYFISH - it detects the model and manufacturer of the harddrive currently installed in the computer and builds a compromised firmware that allows it to find, store and transmit sensitive data completely invisible to the operating system.
It's often glossed over because the technical details and scope are hard for people without a technical background to grasp, but there's no question that the industry helped the NSA exploit their devices - it's almost impossible to write a functioning firmware without examples to work from, detailed schematics and interrupt lists, let alone one that carries out standard functions AS WELL AS functioning as a trojan AS WELL AS doing so without making any calls to the OS or driver.
-
2017-07-27 at 7:24 AM UTC
-
2017-07-27 at 12:50 PM UTC
Originally posted by aldra Almost all of the major harddrive manufacturers colluded with the NSA in building the harddrive firmware module of GRAYFISH - it detects the model and manufacturer of the harddrive currently installed in the computer and builds a compromised firmware that allows it to find, store and transmit sensitive data completely invisible to the operating system.
It's often glossed over because the technical details and scope are hard for people without a technical background to grasp, but there's no question that the industry helped the NSA exploit their devices - it's almost impossible to write a functioning firmware without examples to work from, detailed schematics and interrupt lists, let alone one that carries out standard functions AS WELL AS functioning as a trojan AS WELL AS doing so without making any calls to the OS or driver.
Another thing they don't want anyone to know is it's also highly illegal and that they could all go to prison for it for a very long time. Good thing federal agencies and crony capitalists are above the law, in practice... for now.