KaiserJeep wrote:I have been working on computer hardware design for 37 years. This message is total BS and should be disregarded entirely.
Somebody is trying very hard to start a new conspiracy rumor. Don't fall for it. I decided to reply rather than simply report this bogus message to the Moderator, so that if you see this elsewhere, you will be forewarned.
verax wrote:KaiserJeep wrote:I have been working on computer hardware design for 37 years. This message is total BS and should be disregarded entirely.
Somebody is trying very hard to start a new conspiracy rumor. Don't fall for it. I decided to reply rather than simply report this bogus message to the Moderator, so that if you see this elsewhere, you will be forewarned.
This is no tin foil. Read it again. It is real.
Esssentially, in a nutsell, the CPU microcode is an exploit vector now.
SeaGypsy wrote:KJ the kids love this shit.
Ever since building 7 everytime some half believable conspiracy gets written up there are millions waiting & eager to believe. Amazingly they usually are blind to the paradox involved in wasting precious time in paranoid delusion at worst & stuff we mere mortals can do nothing about at best.
SeaGypsy wrote:Except in the case of peak oil only an imbecile would argue it is not real. In this case it appears you have cut & pasted an extremely technical argument for which you are unable a defense when countered by an expert in the field.
verax wrote:This exploit can draws power from the CMOS battery of the computer, so even if computer is completely powered off and unplugged from the wall it will still work. It sends/recieves info completely out of band communications, so cannot be detected by something like wireshark or a firewall or any splitter or means of deep packet inspection. All of this can be triggered and remotely activated by the built in 3G capabilities found in any modern processor such as part of Intels (Anti Theft) measures. (For example, a Stingray like device can remotely activate the built in backdoors miles an miles away from your location - and this is for air gapped computers, for computer connected to the Internet it is much easier) Once activated, it backdoors the AES-NI component of the processor and instructing it to store all master encryption keys in a hidden section of the processor itself on the CPU chip. The CPU then communicates directly with the memory sticks (DMA in a direct memory access type of fashion) and ethernet/network adapters, bypassing the operating system, harddrive, and even much of the normal /regular motherboard itself. In essence, it is running its own computer within a computer, completely oblivious to the end user. Thus none of this can be detected in the works or caught in the act.
Keith_McClary wrote:It's a watch battery:
It keeps the time while the computer is powered off. Doing the above would run down the battery in seconds (or however long a watch battery would light a 60 watt bulb) and this would result in an error screen when the computer is rebooted.
Return to Open Topic Discussion
Users browsing this forum: No registered users and 23 guests