Godlike Productions - Discussion Forum
Users Online Now: 2,308 (Who's On?)Visitors Today: 1,194,264
Pageviews Today: 1,627,141Threads Today: 422Posts Today: 6,820
01:03 PM


Back to Forum
Back to Forum
Back to Thread
Back to Thread
REPLY TO THREAD
Subject New Intel CPUs Have NSA Exploitable Secret Hidden Backdoor
User Name
 
 
Font color:  Font:








In accordance with industry accepted best practices we ask that users limit their copy / paste of copyrighted material to the relevant portions of the article you wish to discuss and no more than 50% of the source material, provide a link back to the original article and provide your original comments / criticism in your post with the article.
Original Message [link to i.imgur.com]

Hardware security export Damien Zammit revealed some startling revelations in a recent SoftPedia about the secret backdoor built in to new Intel CPUs that no one can touch or disable.

The backdoor, called the Intel Management Engine (ME) is works as a secret subsystem inside your computer’s CPU and runs constantly even when your computer is not turned on.

It works but setting up a TCP/IP server and since the subsystem has complete uncontrolled access to your computer’s hardware, including the network card and memory, it works without the knowledge of your computers operating system and can not be disabled by the OS or by your computer’s firewall.

No one outside of Intel has seen the ME source code and security experts are warning the built-in backdoor has the potential to explode into the worst root kit ever with every modern Intel based CPU becoming compromised.

Intel asserts it is secure from hackers and such attacks because it is protected by 2048 bit RSA encryption which theoretically thought to be uncrackable during the lifespan of everyone living on earth today.

However, the same theories were thought to be applicable to previous incarnations of the current 2048 bit RSA standard each iteration of which was proven to be absolutely wrong in practice.

Given advancements in mathematical theory relating to algorithms such as the variations of the Quadratic Sieve (QS) and the General Number Field Seive (GNFS) combined with advances in computer hardware and software to support parallel computing researchers have repeatedly surpassed theoretical limits decades and centuries before they were theoretically thought to be vulnerable.

In the mean time relatively unexplored frontiers in current technology remain abound.

[link to alexanderhiggins.com]
Pictures (click to insert)
5ahidingiamwithranttomatowtf
bsflagIdol1hfbumpyodayeahsure
banana2burnitafros226rockonredface
pigchefabductwhateverpeacecool2tounge
 | Next Page >>





GLP