Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-12-30 Thread davidvargas1



I forgot to tell you
 I had the same experience,
 the only difference was that my Toshiba laptop started to levitate in mid  
air!, like a flying persian carpet


then my clone desktop PC, decided to dance La Macarena,

 then my LG Smartphone was just laughing AT ALL THIS MESS!

I forgot to tell you guys, I was just dreaming during my sleep!


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-12-30 Thread stask

Enlightening talk. Not a dream. http://youtu.be/b0w36GAyZIA


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-21 Thread Andrew Lindley
You've got RTC alarms, which is what the kernel / BIOS uses to wake 
up the machine.


If you look at this page

https://www.linux.com/learn/docs/672849-wake-up-linux-with-an-rtc-alarm-clock/

You will see if there's any output from

cat /sys/class/rtc/rtc0/wakealarm

Then you have an alarm set.  And it would be best to reset it in case 
of a driver error in any event, use a


sudo sh -c echo 0  /sys/class/rtc/rtc0/wakealarm

Lastly there's been kernel maintenance recently.  It's perfectly 
possible a bug has been introduced that does this with a tiny number 
of machines.  So if there's no output from the first command above 
then boot into an older kernel for a bit.  IIRC it's hold down shift 
throughout boot to get the grub menu where you can select older 
kernels.  (Correct me anyone please if I'm wrong about which key to 
press).


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-21 Thread mikko . viinamaki

 IIRC it's hold down shift throughout boot to get the grub menu
This is correct.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-19 Thread Andrew Lindley

Tested with both packages - no root kits found.

Sadly all it means is that you probably don't have any of the 
rootkits these tools know about.  If you really have caught the 
attention of a somewhat clumsy Advanced Persistent Threat (APT) then 
they'd be quite up to using an unknown one.


However, you said there was no RTC Alarm in the BIOS.  I wonder if 
it's possible to build coreboot, if that's what you have, without RTC 
function?  Does anyone know?  The hardware would still be there. If 
you don't have coreboot then a proprietary BIOS as indicated by 
the links on the Absolute Presence service with Intel Anti-Theft 
horror is a significant security exposure.  Moving to coreboot is 
a possible logical next step.  However, if you have got an APT 
intrusion then building it on your machine would be a mistake.  It'd 
be wiser to say go to a Hacklab, Hackspace, Linux User Group or if 
you are in or near London try BLAG[1] to have someone a) look at the 
machine and b) build you a coreboot image and provide an 
independently sourced Trisquel CD and different Internet connection 
to start again from scratch.


I must emphasise these are just obvious things from someone who knows 
something of security but isn't a security specialist.  So I'll defer 
to other more knowledgeable opinions.


Both complained about java - a .java folder was found in /etc, but 
the

files inside it are empty or blank.

Yes I have that on my machines with Java installed.  As I said the 
tools warn about somethings which are innocent when you check.


[1] BLAG is another FSF approved distro,  They're Brixton Linux 
Action Group, as in it was started by Anarchists.  They may or may not 
help (they're Anarchists) but AFAIK they're the only UK based FSF 
approved distro and your email domain is .uk .


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-19 Thread nux

Yes, I'm in the UK.

Blag hasn't released a new version since Blag 14. Fedora is now on version  
19. Fedora 14 is no longer supported. Doesn't that make Blag a hopeless  
source for a reliable distro?


Besides - recent revelations seem to indicate that machines no longer need to  
be rootkitted - that if there's a bootable micro OS built into the chip (the  
laptop in question is an Intel Core i3 machine) that's triggerable via wifi  
(as long as there's a power supply present) then all the testing apps in the  
world won't find anything on the hard drive, as there's nothing to find.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-19 Thread Andrew Lindley

 Blag hasn't released a new version since Blag 14. Fedora is now on
version 19. Fedora 14 is no longer supported. Doesn't that make Blag a
hopeless source for a reliable distro?

You misunderstand me.  I am suggesting that if London is convenient 
you see if a BLAG developer would be so kind as to have a look at 
your machine and check it over, not that you install the BLAG distro.


Besides - recent revelations seem to indicate that machines no longer
need to be rootkitted - that if there's a bootable micro OS built into
the chip (the laptop in question is an Intel Core i3 machine) that's
triggerable via wifi (as long as there's a power supply present) then
all the testing apps in the world won't find anything on the hard
drive, as there's nothing to find.

It's 3G, like mobile phones, not Wifi.  The point being turning off 
your router would have no effect.


The processor in question will run off the 'standby' power and 
there'd be no need for it to start the actual O/S.  So you'd not be 
finding your computer mysteriously switched on.  If it were someone 
official they'd be able to get someone like the Absolute, who are 
linked earlier in this thread, to access your machine without you 
ever knowing.  So if someone is turning your laptop on remotely then 
they're either a technically inept government bunch or they don't 
have law enforcement powers in the West and are not government.  UK 
plod has the reputation of not being exactly technically proficient, 
but as I say they would just show a court order to Absolute or 
whoever.


Plod et al are reputed to have rootkits and custom o/s mods to 
further real time tracking and interception on phones. So they could 
well install such on anything when intercepts have been legally 
authorised.  But you're much much more likely to get one from a 
cracker through poor security practice.


If it's an i3 then almost certainly there will be a watchdog timer on 
the actual RTC chip.  Many laptops are designed for such things to be 
changed from within Microsoft Windows and so the BIOS UI doesn't 
surface them.  Equally there's no GUI access I know of for them in a 
stock Trisquel install, so try the command line commands and /proc 
listed earlier in this thread.  If you have or do, say what you've 
found here.  Also paste the output of a


sudo dmesg | grep -i rtc

Also test if it's some weird laptop that powers up when the keyboard 
is pressed, as it would from suspend.  If it is and you have a cat or 
similar then very likely that is your problem.  Further if you don't 
live alone suspect other people in the house of not admitting they've 
turned it on before you do the UK government.  As you know from the 
ACPO idiocy and the number of ministers who've found out there's a 
file on them from when they were students, it's not that the UK 
government doesn't get up to such things but they a) don't get caught 
very oten so are good at it and b) are self evidently very careful to 
at least keep up the appearance that it isn't a police state.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-19 Thread nux

Output of sudo dmesg | grep -i rtc as follows

[0.537626] RTC time: 16:21:35, date: 10/19/13
[1.343624] rtc_cmos 00:06: RTC can wake from S4
[1.343727] rtc_cmos 00:06: rtc core: registered rtc_cmos as rtc0
[1.343754] rtc0: alarms up to one year, y3k, 242 bytes nvram, hpet irqs
[1.350927] rtc_cmos 00:06: setting system clock to 2013-10-19 16:21:35  
UTC (1382199695)


I can rule out cats treading on the keyboard - both times the lid was down  
and it's set to 'Suspend on lid close' (which works fine as far as I can  
tell).
I can also rule out other people in the household - one was in bed the other  
has her own Macbook and doesn't use my machine.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-19 Thread nux
I've used Linux as a user for the best part of 10 years, but it's always been  
a political/moral thing rather than a technical one.
So, in all honesty (blushing furiously) I have not gone beyond enjoying the  
fact that 'linux isn't prone to the same nonsense that Windows is' so my  
knowledge of security extends to sometimes remembering to disable ssh access  
on a fresh install.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-18 Thread nux
Well I can assure you that it has happened to me twice. And the laptop has  
Trisquel installed and nothing else.
It was powered down, but the battery was left in, thus providing a power  
source.


I've not seen my desktop PC (Dell Precision 380) do this, which has Trisquel  
installed and nothing else; it's connected via ethernet to a permanently  
powered up modem but the computer has an Intel Pentium D chip in it.


I pretty much think that many articles contain some truth and some lies,  
almost as a matter of course.
So - the laptop is remotely bootable is the truth part and the untruth part  
is but it requires the right software to be installed and a subscription to  
the appropriate service.


If I was developing such an ability it would be OS agnostic and dependent  
only upon a power source and net connection. It makes sense and if a klutz  
like me can figure that out then you can bet that they have too (and a great  
deal more besides).


Further - and this is pure speculation - seeing as the laptop in question is  
now 100% open source without so much as a single line of proprietary code,  
might it not be the case that it can no longer be observed via subroutines in  
blobs and plugins? That would explain why this behaviour has only started  
since I dumped compromised Linux.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-18 Thread mikko . viinamaki

Could it have been WOL or RTC alarm?

https://en.wikipedia.org/wiki/Wake_on_LAN
https://en.wikipedia.org/wiki/RTC_Alarm


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-18 Thread nux

There is no mention of either in the BIOS.
The machine was not plugged into the ethernet, so there'd be no wake up  
signal from that source.
If it came from the wifi, then who sent it? I was asleep, as was everyone  
else in the house.


Hard to see how a real time clock could wake the machine up if there's no  
way to access it from the BIOS or the OS.




Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-18 Thread stask

Noticed the following from Lembas' links...

Wake-on-LAN support may be changed using a subfunction of the ethtool  
command.


In Linux, the real time clock alarm can be set or retrieved using  
/proc/acpi/alarm or /sys/class/rtc/rtc0/wakealarm.[1] Alternatively the  
rtcwake utility may be used which prevents problems when using local time  
instead of UTC by automatically processing the /etc/adjtime file.





Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-18 Thread Andrew Lindley
You might have caught a rootkit.  It's more likely than clumsy 
snoops, although they might use one.


Install packages rkhunter and chkrootkit, read their man pages and 
see if you have one they know about.  You're looking for them saying 
pretty directly rootkit some-name has been found.  You have to be 
familiar with what their reports say for your system before worrying 
about warnings from them for other things because they both issue 
them for perfectly innocent things on a system.  E.g. chkrootkit will 
warn of your X server not having a controlling tty.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-18 Thread darrenvenables
I recently learned that there's a bricking service offered for stolen cell  
phones. After reading this thread, I'm certain that I never want to opt in. I  
don't want anyone else to have control over my devices.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-18 Thread fernando . negro
Yes. Concerning the computer that you have connected, with an ethernet cable,  
to a permanently powered up modem, I guess that, not being a modem integrally  
built into the motherboard, and one that was purchased separately, it reduces  
the risk of the computer being woken up remotely. (And, I've just remembered  
that I used to have my desktop computer connected in the same way to the  
Internet, and never saw it waking up, on its own.) Also, if a computer has  
GNU/Linux installed in it, and doesn't have a recent i3/i5/i7 chip, that  
can bypass the OS, then, even if it's possible, there's no point in waking  
that computer up.


Using the term Wake-on-LAN, that trisq left here, I've just made a quick  
search online, and was able to confirm what my friends said, of being  
possible to wake a computer through a signal on the network. And, as I had  
the impression of, it does require a specific combination of modem and  
motherboard: http://en.wikipedia.org/wiki/Wake-on-LAN#Hardware_requirements


This is why I very much distrust integrally built computers (like  
smartphones*, tablets, and, to some extent, laptops) where every component is  
already built to work very well with each other... And, this is why I think  
that the safer thing to do, is to build our own systems with separately  
purchased components. Because, if, in the former case, all that it requires,  
for your system not to be secure, is that /one/ single company has an  
interest in spying on you, in the latter case, they would /all/ had to be in  
league with each other, to accomplish that, and, I guess, would have to build  
components with several different compatibilities, in order to achieve that.


And, concerning what I'm now reading, about this Wake-on-LAN option being  
controlled by the BIOS... Knowing that my Celeron 433 MHz Toshiba laptop had  
even the BIOS incorporated into Windows, itself - where, I would have to go  
to the configuration options of this (highly suspected of having a back door  
in it) OS to make any changes in the BIOS... To leave a computer like that,  
physically plugged in to the Internet, waiting for some small electrical  
burst, in the phone line, to wake it up... I guess it was really asking for  
it... :)


---
* (notice what Richard Stallman says, in some of his lectures, and what's  
also written on the Replicant web site, about having been discovered that  
some smartphones' modems can access this, and that)


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-18 Thread nux

Tested with both packages - no root kits found.

Both complained about java - a .java folder was found in /etc, but the files  
inside it are empty or blank.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-17 Thread nux
I have spoken out against 9/11, the so called Boston marathon bombing,  
chemtrails, food additives, American foreign policy, Israeli policy, British  
policy, Corporations, surveillance, tax avoidance, the Iraq war, the Libyan  
atrocity, the demonisation of the poor and unemployed, globalisation,  
immigration, the controlled nature of debate in the main stream media, the  
global warming hoax, Apple, Microsoft, etc.


I wil continue to do so until integrity and truth are victorious.


I've seen it happen with a Celeron 433 MHz Toshiba laptop (that I had, more  
than 10 years ago), with the dial-up Internet cable connected to it, where  
the computer simply turned on, on its own, in the middle of the night, some  
time after having been completely shut down.


Then there's no point in me selling the laptop and buying an older model,  
which was my first thought.




Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-17 Thread fernando . negro
(Exactly the same type of things that I write about. And, the kind of things  
that I know that get people, all over the World, under more heavy  
surveillance...) :)


I tried to make this stand out, a bit, but I guess I should take the  
opportunity to make it clearer...


The computers that I mentioned, where I saw this happening, had both  
*Microsoft Windows* installed in them.


(And, I can add that, they both seemed to have some sort of latent connection  
to the Internet...)


I never saw this happening on computers running GNU/Linux.

Concerning the old Toshiba Celeron 433 MHz laptop,

It happened when the computer was completely shut down, and had the phone  
line connected to its 56k internal modem. And, because I had heard, at the  
time, from friends who know about this kind of issues, that it was possible  
to turn on a computer, that had a phone line connected to it, through a  
signal sent through the phone line (and, from what I understood, possibly get  
inside a person's computer, when one thought it was safely turned off -  
although, I have the impression that one would have to have a specific type  
of phone modem and/or motherboard, for that to be possible) my immediate  
reaction, was to unplug the phone line from the laptop. And, I subsequently  
decided, at the time, to never let the phone line connected to the computer  
again, when it was turned off. And, coincidence or not, the fact is that, I  
never saw that happen again.


Concerning the other Toshiba laptop, which is, at most, a Intel Core 2 Duo,

Not only did I saw the computer repeatedly turn on, on its own, but I also  
remember seeing it turn off, a few of those times. So, it was definitely  
acting on its own. I have the impression that it was in some kind of  
sleep/hibernate mode, when that happened. So, I don't know if the WiFi modem  
was active enough to react to outer stimulus. Or, whether this was a freak  
type of behaviour, or not, for sleeping/hibernating laptops, which have  
Windows installed in them. The fact is that, ever since the hard drive on  
that same computer started malfunctioning, and that computer can now only  
boot with a live GNU/Linux distro, running from the DVD drive, I never saw  
that happen again.


I also never saw that happen with an old AMD64 laptop that, ever since I use  
it, only runs GNU/Linux in it. And, I also never saw that happen with a  
relatively recently bought Toshiba laptop, with a chip of the generation just  
prior to this new i3/i5/i7 ones, that, ever since it was bought, has only  
run GNU/Linux.


So, this type of suspicious behaviour, was only observed, by me, in computers  
with Microsoft Windows installed in them.


(And, as I implied... And, taking the opportunity to make things more  
clear... And, unlike other things that happened to me... Concerning this type  
of strange computer behaviour, I have *no idea* if this is an indication of  
remote access, or not. The fact is that, nothing surprises me, any more, in  
terms of surveillance. So, I wouldn't be surprised if I someday knew that it  
was, indeed, an indication of remote access...)


But, of course, as you now know... Having GNU/Linux installed on your  
computer is not protection enough for this new generation of Intel chips,  
that can be remotely activated by a 3G radio signal...


But, as I said, I never observed any kind of suspicious behaviour on laptops  
with chips of prior generations, running GNU/Linux.


So, I think it should be safe to use those.

(Although, one can never be 100% sure, about anything, relating to computer  
security... And, I, nevertheless, usually cover the webcam of the recently  
bought Toshiba laptop...) hehe :)


What a surreal world this is, that we live in...


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-17 Thread fernando . negro
And, for those of you who may doubt, as to whether there is cause for  
concern, or not...


People who expose information that is damaging to the establishment are,  
indeed, being surveilled,


http://www.naturalnews.com/040492_GMO_activists_Monsanto_blackwater.html

and, are having their computers attacked.

http://www.globalresearch.ca/the-sinister-monsanto-group-from-agent-orange-to-genetically-modified-corn/5342923


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-16 Thread nux
Twice in the last week I have picked up my laptop in the morning only to find  
the OS booted.
As a rule I don't leave it switched on, though when I've come to start it up  
only to find it already booted I can never be 100% sure it's not because I  
forgot to power it down the night before.
This morning it was booted when I opened the lid, the battery reads 37%  
drained ( I was using it on battery power last night and usually, if I close  
the lid, it doesn't last 4 hours when suspended and I haven't used it since  
10:30 last night (nearly 12 hours ago).


It's a core i3 Asus. I have the webcam and microphone stopped with gobs of  
blutak, but keep forgetting to take the battery out when I shut it down for  
the night.


I don't know whether to be paranoid, frightened or annoyed at my own  
forgetfulness.







Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-16 Thread fernando . negro
I've seen it happen with a Celeron 433 MHz Toshiba laptop (that I had, more  
than 10 years ago), with the dial-up Internet cable connected to it, where  
the computer simply turned on, on its own, in the middle of the night, some  
time after having been completely shut down.


And, I've seen it happen, much more recently, about a dozen times, or so, to  
a computer of a family member, also in the middle of the night, when I was in  
the living room, where the computer simply turned on, on its own. (This last  
computer being, at most, an Intel Core 2 Duo, one with WiFi, and also a  
Toshiba.)


And, having both computers Microsoft Windows installed on them, and also  
microphones incorporated in them.


*(Either any of this has anything to do with it, or not...)*

Taking into account that I (now) know that I was already, more than 10 years  
ago, (and, still am today) under surveillance, because of what I do, and  
write about, none of this surprises me. (And, I could talk about more things,  
that have happened to my phone line, that also don't surprise me.)


As I've said, in here, earlier...  
(https://trisquel.info/en/forum/internet-censorship-authoritarian-countries#comment-30785)


We are *all* under surveillance. (And, even more, everyone that is  
politically active, or that does anything that the establishment doesn't like  
- including, simply being a part of the Free Software movement.) The only  
question, for each different individual, is how heavy that surveillance is...


Just as two more recent examples...

Someone that I met in this forum, has recently reported signs, to me, of what  
is (to me, that am already experienced in this kind of things) clearly signs  
that such person is (also) under surveillance. (Having that person recently  
launched a project that is, very much clearly, counter to the interests of  
the establishment...)


And, I've just finished exchanging some messages with a journalist, because  
of what I was able to confirm that was, yet another, case of censorship of  
comments of mine, this time on his blog, on Blogger (/Google/CIA/NSA). Having  
that censorship been made by someone else, other than the journalist who  
approves them - who confirmed, to me, that it wasn't him...


And, concerning your case

*(Either this strange behaviour of your computer has anything to do with it,  
or not...)*


The fact that you reported, above  
(https://trisquel.info/en/forum/secret-3g-intel-chip-gives-snoops-backdoor-pc-access#comment-43136),  
a surveillance scheme operated in your country, is enough for you to deserve  
the attention of Big Brother, itself - who will, obviously, want to know  
everything (more) that you know (about this, or anything else).


I know what I'm talking about, when I say this...

And, I could talk much more about this kind of things... And, could even talk  
to you about subjects that, If you research too much about them, on the web,  
will make your computer be cleaned of all its data...  
(https://trisquel.info/en/forum/chrome-os#comment-33954)


But, as always, don't believe this kind of things, just because someone else,  
that you don't know, told you so.


Make the test, if you want, of being politically active, and you'll see just  
how heavy the powers-that-be will fall upon you.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-14 Thread reginamaidgranada
Well, im just glad to found http://www.spectra.com for some specs I need. And  
almost any PC parts.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-10-14 Thread leny2010
Are you saying GSM because of something you know that isn't featured  
elsewhere?  GSM is an old protocol, end point to mast security is not up to  
the requirements of today e.g.


https://www.computerworld.com/s/article/9218866/Researchers_show_off_homemade_spy_drone_at_Black_Hat

3G OTOH AFAIK hasn't been cracked, because it is much more recent.

Of course if it is GSM some Black Hats switching off entire districts' worth  
of laptops would make the manufacturers and Intel very unpopular.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-30 Thread chris
I'm not actively looking into it so I can't say for sure. I think there is or  
may be a home-grown solution from China now or in the future which might  
work. I think there are hurdles to overcome still although I can't recall  
what they are any more.


...

When I think we are ready to do something from a financial perspective I'll  
investigate it further.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-30 Thread chris
The solution is to ignore or push back the people who are making BS  
claims/dividing us/etc. Don't assume your safe, but take action to avert  
problems, and help fix them. There may be a few great people leading. However  
it takes everybody to fix the problems.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-30 Thread stask

vPro manual from intel

http://www.intel.com/content/www/us/en/enterprise-security/3rd-gen-core-vpro-data-protection-paper.html

Good discussion at Wilders Security on this topic as well. Sandy Bridge  
background, intesting post...


http://www.wilderssecurity.com/showpost.php?p=2286063postcount=46


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-30 Thread pedrosilva

Really interesting and alarming story. Two solutions could be:

1) Buy an old analog telephone. If you're not an expert, have someone of your  
trust analyze and eventually hack it,

so that when the phone's on the cradle the mic is disabled.

2) You have your telephone inside a soundproof box. When it rings lights  
flash/whatever. 


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-29 Thread stask
Wanted to add a footnote on the 3g, right from the source. Re-read some  
earlier posts...


Jeff Marek, director of business client engineering for Intel, acknowledged  
that the company’s Sandy Bridge” microprocessor, which was released in  
2011, had “the ability to remotely kill and restore a lost or stolen PC via  
3G.”


https://trisquel.info/en/forum/million-dollar-question-concerning-hardware-we-use#comment-43144


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-29 Thread stask
The link above from an opinion article published in 2008 contains many  
details, a must read...


Same link here below:

http://www.tgdaily.com/hardware-opinion/39455-big-brother-potentially-exists-right-now-in-our-pcs-compliments-of-intels-vpr


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-29 Thread bruceharrisperry
I see the snoops talking about using my mouse right now. If anyone is  
interested an online, look at my log files.




Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-28 Thread Miguel Guasch
Every time I read things like these, I am so tempted to buy a yeeloong 
notebook..


How is the status on the MIPS architecture?

-Miguel

On 09/28/2013 06:25 AM, n...@blueyonder.co.uk wrote:

Answering my own question...

http://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/ 



All the articles seem to reference the same Australian Financial 
Review story from July of this year.


http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI 



And a denial from AMD here.

http://fudzilla.com/home/item/32120-amd-denies-existence-of-nsa-backdoor

One is tempted to think well, they would say that, wouldn't they? No 
one's going to admit to this and see Government and/or military supply 
contracts lost.


I've spent the last 10+ years loving IT, spending every spare moment 
in front of my pc. Most of them using Linux. I was happy, believing 
that if we could just get enough people interested in Open Source 
that the world could be made a better and safer place, free from the 
tyranny of Corporate nonsense and spying.
Over the last few days, as a result of the various links on this and 
other threads here, everything has changed. Now it all seems nasty and 
suspicious. I used to think I cannot help someone to be happy with 
Windows or Apple, without at least warning them of the loss of privacy 
and control they bring with them but now I'm wondering if the message 
should be if you have a computer, regardless of what you run on it, 
you're unable to rely on being secure or safe.


What if NSA employees are masquerading as OpenSource contributors? 
What if they are maintainers for various bits of code? If code comes 
from a trusted person is it really reviewed by others for compromise 
or is it accepted as trusted and included without being checked?


We had a story break here in the UK a few months ago, whereby it 
transpired that undercover Police had infiltrated various political 
movements, to the extent of having sexual relationships and even 
children with women in the movements. If that is the level of abuse of 
trust that is being carried out in order to monitor dissidents, then 
it's highly likely that some trusted contributors are indeed working 
for the security agencies, with hidden agendas.


Once stories like that become known it naturally and presumably 
intentionally, introduces mistrust into every such movement, as people 
begin to look at people they thought were trusted and wonder are you 
a Policeman too? Such mistrust tears movements apart, again, 
presumably quite deliberately.


Divide and rule.

So it comes down to this, for me - I'm not involved in anything that 
could be described as genuine terrorism. I don't call for the deaths 
of politicians or bankers. I speak out as and when it seems necessary, 
always and only in defence of the weak and the poor. If the day should 
come when they're arresting people for doing that then that's no world 
I wish to live in and I'll take the consequences without shame.
Or put another way f*ck 'em, I'm doing no wrong and I'm not going to 
let a bit of fear (perhaps unfounded and introduced by those who wish 
to destroy the OSS movement) stop me from thus speaking out.








Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-28 Thread stask
One is tempted to think well, they would say that, wouldn't they? No one's  
going to admit to this and see Government and/or military supply contracts  
lost.


Military is different apparently. Go to the bottom of the compatible BIOS  
list http://www.absolute.com/en/partners/bios-compatibility and look at  
Xplore Technologies. It says All models except IXC104M Military version


So at least one seller on that list offers a military version that does not  
have these features that we apparently must have.


Mistrust is a huge thing now. We can never really trust anyone or anything  
completely, however when someone has problems, financial difficulty,  
addictions, whatever, well those things happen and usually in a limited way.  
The length to which you describe, where infiltration goes to the level of  
having children with the target, that is very deep, so calculated. There  
obviously are no boundaries.





Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-28 Thread stask
ARM chips (phones, tablets, some computers) also have something similar. I  
have not yet found companies supporting those features to the degree of  
intel, but I haven't looked much yet either.


https://trisquel.info/en/forum/some-current-free-software-friendly-hardware#comment-43157


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-27 Thread stask
Such as was noted by the service provider above, This technology is built  
into the processor, so this will be activated even before the laptops startup  
and *will work even without internet* as it is hardwired and it is completely  
tamper proof.


I don't know what that means, but they have stated it clearly.

Perhaps it is a radio signal of some kind which gives simple switch like  
yes/no or on/off instructions, not the real internet, not a cell phone  
network, not a network in the sense of a standard computer network.


I haven't had time to review all the services of the providers intel has  
listed. I know they don't all offer exactly the same services. From a brief  
overview, it was startling to see how much they can do. And that they've been  
doing it for years.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-27 Thread stask

MORE

Called absolute persistence technology by one of the providers, they say they  
can send an SMS for immediate lock functionality.


http://www.absolute.com/en/partners/alliances/intel

With Intel Anti-Theft, Absolute customers can:

Trigger an Intel Anti-Theft lock using real-time technology within the  
Absolute Customer Center, sending an SMS message to the computer and invoking  
the Intel Anti-Theft lock almost immediately. To take advantage of this  
SMS-only immediate lock functionality, you will require Intel Anti-Theft  
supported hardware (Intel Core i3, i5, or i7 notebooks).


How it works

Hardware

The first step is hardware-based and occurs before the device
is even built. Through our partnership with computer
manufacturers, the persistence module is built into the
firmware of desktop, laptop, tablet, and smart phone
devices around the world. Each device leaves the factory
with the persistence module in place, waiting to be
activated.

http://www.absolute.com/en/partners/bios-compatibility
(Note that even the 7 year old Lenovo X series, considered to be close to  
free computers, are BIOS and firmware capable for the use of this system.)


Software
This occurs when the software agent is installed. It’s the step that turns  
everything on and it’s through this agent that device information is  
transmitted to IT so they can remotely track, manage, and secure devices.


Persistence
Even if the firmware is flashed, the device is re-imaged, the hard drive is  
replaced, or if a tablet or smart phone is wiped clean to factory settings,  
the agent will simply reinstall and continue to provide hundreds of data  
points for each device. And it’s a two-way street. The same connection can  
be used by IT to convey a variety of remote security and management commands  
back to the device.


We’ve provided forensic evidence to close to 5,000 law
enforcement members around the world, allowing them to recover over 28,000  
stolen devices and put countless criminals behind bars


http://www.absolute.com/en/resources/whitepapers/absolute-persistence-technology

So, this technology is in the hardware. In a lot of hardware. It needs  
software to activate it. Many chips now allow installing software remotely  
even if the computer is powered down, it can be turned on and updated. Not  
saying this is happening all over the place, it just feels quite out of  
control to be the owner of a device and be unable to have complete say over  
what is to be done with it.


If alerted to the intent for some control to be added over the machine, that  
would be one thing. To have the capability to alter the machine without the  
owner knowing, is not something I wish to pay for or own.


These controls make sense in a corporate or government setting, but for  
personal use, how can one be sure these features are permanently turned off  
or rendered useless? These are known backdoors. What if we can't be certain  
they are closed? What about unknown backdoors. It doesn't end.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-27 Thread nux
I've yet to see the name AMD in all of this hooha about backdoors in  
hardware.


Has anyone come across their name in any articles?




Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-27 Thread chris
Yes- AMD has implemented similar questionable technology. I haven't read up  
on either terribly though.




Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-27 Thread nux

Answering my own question...

http://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/

All the articles seem to reference the same Australian Financial Review story  
from July of this year.


http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI

And a denial from AMD here.

http://fudzilla.com/home/item/32120-amd-denies-existence-of-nsa-backdoor

One is tempted to think well, they would say that, wouldn't they? No one's  
going to admit to this and see Government and/or military supply contracts  
lost.


I've spent the last 10+ years loving IT, spending every spare moment in front  
of my pc. Most of them using Linux. I was happy, believing that if we could  
just get enough people interested in Open Source that the world could be made  
a better and safer place, free from the tyranny of Corporate nonsense and  
spying.
Over the last few days, as a result of the various links on this and other  
threads here, everything has changed. Now it all seems nasty and suspicious.  
I used to think I cannot help someone to be happy with Windows or Apple,  
without at least warning them of the loss of privacy and control they bring  
with them but now I'm wondering if the message should be if you have a  
computer, regardless of what you run on it, you're unable to rely on being  
secure or safe.


What if NSA employees are masquerading as OpenSource contributors? What if  
they are maintainers for various bits of code? If code comes from a  
trusted person is it really reviewed by others for compromise or is it  
accepted as trusted and included without being checked?


We had a story break here in the UK a few months ago, whereby it transpired  
that undercover Police had infiltrated various political movements, to the  
extent of having sexual relationships and even children with women in the  
movements. If that is the level of abuse of trust that is being carried out  
in order to monitor dissidents, then it's highly likely that some trusted  
contributors are indeed working for the security agencies, with hidden  
agendas.


Once stories like that become known it naturally and presumably  
intentionally, introduces mistrust into every such movement, as people begin  
to look at people they thought were trusted and wonder are you a Policeman  
too? Such mistrust tears movements apart, again, presumably quite  
deliberately.


Divide and rule.

So it comes down to this, for me - I'm not involved in anything that could be  
described as genuine terrorism. I don't call for the deaths of politicians or  
bankers. I speak out as and when it seems necessary, always and only in  
defence of the weak and the poor. If the day should come when they're  
arresting people for doing that then that's no world I wish to live in and  
I'll take the consequences without shame.
Or put another way f*ck 'em, I'm doing no wrong and I'm not going to let a  
bit of fear (perhaps unfounded and introduced by those who wish to destroy  
the OSS movement) stop me from thus speaking out.




Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-26 Thread nux
So the moral of the story is, when you power down, pull the plug or remove  
the battery?


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-26 Thread Miguel Guasch

On 09/26/2013 06:13 PM, fernando.ne...@mail.ru wrote:

(It never ends...)

http://www.prisonplanet.com/secret-3g-intel-chip-gives-snoops-backdoor-pc-access.html 



(And, this is what I'm talking about, when I call everyone's attention 
to also the *hardware* that we use... - 
https://trisquel.info/en/forum/million-dollar-question-concerning-hardware-we-use)




I first found out about this while perusing the thinkpenguin website. 
They explicitly state that they do not offer CPUs which have either vpro 
or txt technologies.





Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-26 Thread arielxgbarton
Very bad. These designers have no ideas about what is/isn't morally right. Or  
they do not care.


How would this work? Surely the metal computer enclosure would block out any  
signal?


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-26 Thread nux
Back when I was first online, circa 2001, I came across a post on a forum (I  
can't find it now, it may no longer exist) from a person who claimed that he  
left what was then called the GPO in the 1950's (now called BT) when he  
discovered that when you put a domestic phone back on its cradle that the  
speaker was cut off but not the microphone and that the roll out of the  
domestic phone network was basically a State sponsored bugging program (how  
they must have laughed, indeed are still laughing, that we pay them for the  
mechanisms used to spy on us) and that any house with a phone could be  
listened in on. (I worked for BT briefly in the early 1980's and there were  
rooms with military personel in them underground beneath one of the BT  
buildings. Listening for enemy activity I was told. I just presumed they  
meant the enemy as in the Cold War.)


At the time I thought oh dear, paranoid much?

Bearing in mind that basically pretty much everything we've been told since  
1945 has been an artificial contruct (the lies told about WW2 in the official  
account are off the scale) and pretty much everything you see on the News is  
made up, added to all this now coming to light about computers and I'm  
thinking, no, not paranoid at all.

If it's been going on since the 1950's then it's now very advanced indeed.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-26 Thread fernando . negro
I suppose that will pretty much prevent unwanted access to your computer when  
it's turned off - but, not when it's turned on...


So, I think the moral of the story is: just don't buy new Intel chips.


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-26 Thread fernando . negro

I'm not surprised to read that...

Since that, that's something known to be possible with modern-day phones,  
like cell ones - and when they're turned off:  
http://www.youtube.com/watch?v=0G1fNjK9SXg


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-26 Thread chris
I'm pretty confident that the 3g is not built into the chips. It's dependent  
on the system having a compatible 3g card installed. So while this story has  
some level of truth to it it they made assumptions and stretched that truth.


If 3g was actually embedded in the chip somehow and I'm pretty confident its  
not you'd be able to detect it. Think about that for a moment. The chip has  
to send out a radio signal of some kind. Plus there is going to have to be an  
antenna of some kind or the reception would be horrible. 


Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-26 Thread stask

It's in the chip.

This video at around the 50 second mark says laptops do not have to be  
connected to a network and can still be disabled remotely. How?


https://www.youtube.com/watch?v=7S4BUAm68eg

Disable lost or stolen laptops, even if the PC is not connected to the  
network. (With a superscript 8) There is a footnote at the end of the video.


 ...Requires an enabled chipset, BIOS, firmware, and software... Strangely  
it says nothing about hardware. Also needs a ...subscription to a capable  
service provider...


List of providers
http://www.intel.com/content/www/us/en/architecture-and-technology/anti-theft/anti-theft-service-providers-enterprise.html

http://www.allieddigital.net/us/IntelAT/
Intel® Anti-Theft Technology is an intelligent way for you to help secure  
the mobile assets of your workforce. This intelligent security technology is  
available on 4 generations of laptops based on Intel® Core™ and Intel®  
Core™ vPro™ processor families. This technology is built into the  
processor, so this will be activated even before the laptops startup and will  
work even without internet as it is hardwired and it is completely tamper  
proof.


http://www.securedisable.in/WhySecureDisable.html

Looking at several of the companies on intels service provider list is very  
interesting. Way lots of control so to speak.


Who's to say that like the onStar non-subscribers who are still being  
tracked, that something similar is not available on laptops to the right  
people or agencies?  
http://www.popularmechanics.com/technology/gadgets/news/the-onstar-incident-isnt-about-digital-privacy-6499661





Re: [Trisquel-users] Secret 3G Intel Chip Gives Snoops Backdoor PC Access

2013-09-26 Thread chris
Your reading too much into without a network connection. That would still  
require a GSM module in the system. If you think about it logically you would  
still require a network connection of some kind to communicate the message  
disable system. Now it may be that the network card has firmware that is  
communicating with a server somewhere such that no GSM module is required to  
disable the system.


I would be interested in seeing the network traffic from testing anti-theft.  
Both wireless, ethernet, and GSM just so that we have a better understanding  
of how this technology actually works.