On 05/02/2017 01:57 AM, John Newman wrote:
>
>
>> On May 1, 2017, at 8:16 PM, Mirimir wrote:
>> You can check your CPUs for vPro etc at https://ark.intel.com/#@Processors
>>
>> Intel's mitigation guide:
>>
> On May 1, 2017, at 8:16 PM, Mirimir wrote:
>
>> On 05/01/2017 11:21 AM, Ryan Carboni wrote:
>> https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/
>>
>>
>>> First a little bit of background. SemiAccurate has known about this
>>
On Tue, May 2, 2017 at 5:21 AM, Ryan Carboni wrote:
>
> keep in mind, just how many computers run Intel. We don't backdoor
> encryption. We backdoor everything.
>
The back door is a *feature*, not a bug, right?
For instance, this company is quite proud of their back door
Maybe. Maybe not.
But regardless of who is moonlighting for whom, even if it is entirely
unpaid and inadvertent (which beggars some disbelief), this was a top
picture shared on many social media outlets:
https://i.redd.it/m2qtwn72m7ny.png
Not shown by the mainstream media though.
Who decides
On Mon, May 01, 2017 at 03:21:52PM -0700, Ryan Carboni wrote:
> https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/
>
>
> First a little bit of background. SemiAccurate has known about
> this
> vulnerability for literally years now, it came up in research we
> were
On 05/01/2017 11:21 AM, Ryan Carboni wrote:
> https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/
>
>
>> First a little bit of background. SemiAccurate has known about this
> vulnerability for literally years now, it came up in research we were doing
> on hardware
On Mon, 1 May 2017 15:21:52 -0700
Ryan Carboni wrote:
> https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/
>
>
> > First a little bit of background. SemiAccurate has known about this
> vulnerability for literally years now,
https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/
> First a little bit of background. SemiAccurate has known about this
vulnerability for literally years now, it came up in research we were doing
on hardware backdoors over five years ago. What we found was scary