Always remember that whatever tools of Information War the Cabalists created, the Patriots in the Q Team undoubtedly have access to now. The White Hats intentionally encouraged the rapid development of modern computer hardware and software of all shapes and sizes over the past 60 years. Recall what Q told us about the NSA, and who Snowden really was, and what is true purpose really was. He was sent to the NSA to throw a wrench in the White Hat surveillance operation.
When Q tells us that the Patriots are in control, and that the Patriots have it all, I think the referenced story above is exactly why. If you and I have a compromised device in our pocket, or car, or our home, guess who else does? Every antifa / blm member, every crooked politician from your local sheriff, to the members of Congress and the Senate, and every communist that has infiltrated our society and government at any other level.
Anons might not want to hear this, but this type of surveillance may very well be the only way to truly expose and put a stop to the Deep State and Cabal.
Ive published info on Intel's ME and its three Minix instances it runs for many years, and how to shut down parts of it.... but I have no energy to share my stuff to scored, nor GA.
But I am the most qualified to comment on this site.
As for the OP post... parts seem larp-y to me, though its 99% plausible as written. It just seems odd that a proven Israeli team, in Israel, that codes the Intel M.E. elements, would somehow use non-Israeli citizens and furthermore require USA security clearances.
Chances are the poster, if real, was not a principal engineer on M.E. at intel.
All tech aspects mentioned are factual, but officially a USB dongle with intel supplied crypto key must be inserted onto motherboard to allow the M.E. to be re-provisioned, altered, or even debugged. Allegedly it has no WILLFUL backdoors, but like prior hypervisers probably has stuff that looks at a interrupt time call stack for 16 pushed registers of special values to decide to move forward.
There’s no option but to assume that the intelligence agencies are fully aware of everything you see and do on every device at all times. They’re probably not quite there but that’s the only safe assumption.
I have successfully installed Ubuntu on practically every Windows and Mac machine I have possessed. If
you are considering purchasing a new machine specifically for Linux, I highly recommend System76
(system76.com). All of their laptops have the Intel Management Engine disabled. This tiny operating system
within the firmware of the processor could potentially allow unrestricted, and unknown, remote access to
your machine. There is much debate about the likelihood of this happening, but I welcome the paranoia. |
use a System76 machine as my daily driver. This is not a paid endorsement, and I purchased the machine
myself (through anonymous payment of course). The following will install Ubuntu Linux to your machine
and harden the settings.
Insert the Ubuntu USB device and power on the computer. If the Ubuntu install screen is not present,
research the appropriate option to select a boot device for your computer. This is typically the F1, F2, F10, delete, or escape key. Pressing these immediately after powering on should present an option to
boot to USB or BIOS.
On the Welcome screen, choose “Install Ubuntu” and select your language.
Choose “Normal Installation” and check both download options under “Other”.
If you no longer need any data on the drive inside your computer, choose “Erase disk and install
Ubuntu’. This will destroy any data present, so please be careful.
Click “Advanced features”, select “Use LVM with the...” and choose the “Encrypt the new...” option.
Click OK to proceed, then click “Install Now’”’.
Enter a secure password which you can remember and is not in use elsewhere.
If you are overwriting a used computer, consider the “Overwrite empty disk space” option. This will
delete all data on the drive, and could take a long time.
Click “Install Now’, ‘Continue’, choose a location, and click “Continue’’.
Provide a generic name such as “Laptop”, and enter a secure password. This could be the same as the
encryption password for convenience, or you could select a unique password for additional security. You will need both of these passwords every time you boot the computer. Most people use the same
password.
Confirm your selections, allow the installation to complete, and reboot.
Provide your password(s), then click “Skip” on the welcome screen.
Select “No, don’t send system info”, “Next’’, “Next”, and “Done’”’.
If you receive a notice about updates, click “Install Now” and allow to reboot.
Note that these steps may appear slightly different on your version of the installation software. You should now
possess an Ubuntu Linux installation with full disk encryption. This prevents someone from accessing your data
even if they remove your hard drive. Right away, you are very private and secure, but | always make a few
modifications before introducing Ubuntu to a client. The first three Terminal commands disable Ubuntu’s crash
reporting and usage statistics while the remaining steps harden your overall privacy and security. Click the nine
dots (ower left) to open the “Applications” menu, scroll to “Terminal”, open it and execute the following
commands. You may be prompted for your password
Hey quick question, there was a post a few months back that gave every stickied post on GAW. Do you still have that link? I'm having trouble finding it
Great information on system76 etc. I have to say though that Ubuntu is to be avoided these days.
It seems as if it got too popular, the company behind it (Canonical) became infiltrated and they started systematically trying to flush this distribution down the toilet.
Did you hear about the old-old scandal where the Ubuntu "Start button" on your computer was sending search info to Amazon? Literally searching your own files and Amazon got the info. That was in maybe 2014 ballpark.
There are no natively installed packages now, they are all snap packages, which is a very non linux way of doing things, causing slow opening times and, somewhat debatebly, a nefarious package manager to run (snapd).
Linux Mint is based on Ubuntu, although even they have started Linux Mint Debian Edition (Based on Debian) because they can see the writing on the wall.
Linux Mint paired with KDE Plasma desktop environment (Installed separately) and preloaded with all multimedia codecs out of the box is a far superior product to Ubuntu. Mint uses open source flatpak to accomplish what snap does when required which is not much. They specifically remove snap functionality from their distro.
The customization possible on KDE plasma is unparalleled. Everything is malleable to your will. You can have a giant start button that fills the entire screen if you want. Maybe you want Mac windows with the poxy little traffic light buttons or maybe icons from off the side of an alien spacecraft. Nested, multiple panels on every screen edge? Completely change the workflow? No probs, right from the GUI.
I'd refer back to the Corney and Zuck appearances before Congress, where they physically covered their cameras. I ask any scoffers, if the heads of intelligence and the biggest info-gathering sites both decided that this was the only way to be sure, what else should regular old us do?
I use a monitor with laptop behind, so the laptop cam is looking at a wall... As far as mic, I'm not making any interesting statements verbally. Government spying on us via our computers predates the web...
The TAO catalog had that nice thing where they'd hijack your shipment of things like routers and replace it with a pre-pwned one. Pretty sure it was Snowden who leaked that?
Also I'm pretty sure AMD has something similar called Platform Security Processor. Its there, but not nearly as blatant as Intel's is though.
Here's some interesting videos from Mental Outlaw on this subject.
It's so fucking bad that the most popular operating system in the world is Minix OS, the operating system of the IME. Just as the anon said, it does not matter if you are running Win, Mac, Linux, because you are also running Minix OS on the (edit) -3 ring.
It has a permanent connection to the Ethernet port and can power up your computer when it's off amongst many other poxy attributes.
I heard that companies are not happy about the disgusting holes and backdoors and it is getting turned off by some manufacturers on new devices and may be discontinued.
Apparently not, if you have a battery. If you're talking desktop, possibly, at least to prevent while-sleeping exploits. But it's tracking and sending everything done, regardless of vpn. Nasty.
I read that IME needed an ethernet connection to power up your computer when it is off. It is not possible for it to turn power on over a powered down wifi adapter.
So you are probably OK overnight if not using a physical wired connection to the router.
I had not heard of any 3g or 4g capability of IME but I am by no means an expert on it. (Edit:- Seems I may be wrong but it may be Called ProV and AMT)
There is some power supplied over ethernet although I am not sure if IME can use this to run. You would be better using a wifi adapter or disconnecting the ethernet at night than the power in my understanding. Any air-gapped computer should be immune.
You would need a PoE capable switch to power up any device.. and the device would have to be capable which most systems aren't except for phones, cameras, APs... devices designed to have no power cable.
I turn off my router and all my devices at night. Id think the lack of wifi would probably be a detriment. But then all Im doing at that time is sleeping anyway.
Im not really worried about the spying. I figure Im done for if they begin rounding people up enmasse anyway. I turn wifi and devices off to limit the radiation my family soaks up in a 24 hour period.
When Patriots win this thing somethings got to be done about the radiation. Have you ever wondered about the explosion of tinnitus around the country. Im certain its the wifi and phones. I have constant tinnitus but am otherwise healthier than 90% of my age group. It began around the time wifi became ubiquitous and the phones went from flip to smart.
Yes! We have been wired Ethernet in our house for 10 years after I got sick streaming video calls all day. That year we grew a table full of tomato starts in our basement near the WiFi router and the ones closest to the router all dies, then in between ones that survived but were weak, then the decent ones were several feet further away. We are doing this to our bodies why?!
Me too. At times it if deafening at night. My hearing is excellent and what I hear is not run of the mill tinnitus. At least I know that I am not the only one.
As intrusive as this sounds, there are a couple of things to consider.
1.) This is more than likely using ipv4 still for traffic, most consumer routers are not using IPv6, hell most corporations are not using IPv6.
2.) The only two routing protocols most home routers understand are IPv4 or IPv6, so if there was some custom protocol it would go no where. There are a lot of network protocols, the vast majority can not be routed i.e. traverse the internet.
3.) Any good network engineer or linux guy worth his salt can and would filter weird, unrecognized outbound traffic.
4.) The addresses used for spying and control would have to be hardcoded into the chip, making it easy to filter, very doubtful it initiates any kind of tunnel, which again can be filtered.
5.) This requires using an Intel motherboard one would assume as a seprate cpu is mentioned, not a core. Lots of computers, servers, and other devices do not use intel anything.
All in all, an attack vector of this type comes across as targeting something in particular. This isn't for regular consumers, seems more like it would be against governments, utilities, and organizations of that type. Most consumers aren't that important for this kind of attack, unless everyone had an intel laptop/desktop. I see this as something to be aware of, but can be dealt with. It would be interesting to know what this chip went into, cars for example.
well sadly, when it comes to computers/networking, most people have the "as long as it works" mentality, and wouldn't care, much less know what to do, if netflix works, they are good. In general, with all the garbage that is going on that we know about here, the magnitudes of people that are completely ignorant, willing and unwillingly is huge, and that plays right in to it -- bread and circuses.
A compromised computer may not see the network traffic but you couldn't hide it from your switch and router. Unless it used cellular or something wireless. Or they sneak packets through popular websites like Google but the website would have to be in on it.
AMD also has a form of the Intel Management Engine (IME). AMD calls theirs the Platform Security Processor (PSP) also known as AMD Secure Technology. Much like Intel's solution, it is a complete system entirely isolated within the physical CPU chip.
The Intel Management Engine stuff goes back a little further than i3/i5/i7 era chips putting it about 2007-2008.
AMD had publicly started to put their "security" solution into their chips around the bulldozer era of chips 2011-2012.
Also, modern motherboards use UEFI bios which is just as worrying as all the stuff in the CPU chips.
There are some projects like coreboot and libreboot to counter the UEFI problem. Society is based on trust though, for example trusting UEFI vs trusting contributors to these other projects. These types of projects are not for the faint of heart. Should you try it I highly suggest a purpose built computer just for that.
Regarding the CPU chips, there's nothing you can do to the chips today. Many people use a single device these days and everything they do is on it. Having multiple devices for certain activities can help a little bit I guess but it only spreads the problem out not eliminating it.
You can always obtain older hardware to try and avoid the "features".
I'm surprised that the Kali folks haven't put out an opensource version of the IME dashboard, if the spooks can access your machine from anywhere, why not a public version for me to play with?
This sounds a lot like CALEA, which requires that telecommunications carriers and manufacturers of telecommunications equipment (including ISPs and VoIP providers) design their equipment, facilities, and services to ensure that they provide law enforcement with the necessary surveillance capabilities. Fun law! Thanks, Bill Clinton!
Synth from Skycoin talked about this, part of the idea of the project was to create RISC based open source hardware chips to reduce the chance of having hardware backdoors in everything.
Skywire currently runs on a few thousand Raspberry pis, works as a VPN along with being a new type of more secure internet.
I do think these things were pushed by the Q people as now they have access to everything also, who do you know that does not have a phone or computer when they said they have everything they were not joking.
I've just assumed this was the case for a long time. I'm sure AMD and Apple do the same. A few years back there was this thing I think called spectre where they found "accidental" backdoors in x86 chips. I took that as confirmation. The way I see it my door will be far from the first one knocked on anyways. Just one more thing that must be fixed when we are actually in charge.
A VPN is an extra layer of inconvenience for governments.
If enough people use them without "anything to hide", then the government wastes time and resources chasing all that down, making requests across the world for information from VPN services, etc.
I'll read through it some more to ascertain its capabilities, and maybe use it, because I still have my Gen1 up and running. It seems to be a very good candidate for more eh ... secure and prosperous encounters ...
The good guys knew for YEARS that this was happening. I heard about this in the early 2k's, so it goes beyond the 15 years this guy is talking about. Also, PBX's are 100% compromised with back doors as well, and I've known about that since the mid 90s. Lucent technologies PBX's were a nightmare for the US Government when they found out about the embedded back doors that were all on Chinese made chips.
I wonder how far back this goes...In other words, besides the "clipper chip" thing we all heard about years ago, I wonder if this crap is not present in say an XP era processor. Anybody know? You can still run a lot of stuff on an XP era machine....I have several running legacy chit...
Heh, just saw Steam won't run on anything less than windows 10 by year end. Looking into changing all remaining machines to Linux, and/or building my own. My brothers ahead of me on that.
I'm kind of an expert on this subject but I'll just cut to the chase: the newest x86 laptop with no hardware back doors is the Lenovo g505s with the AMD A10-5750M APU form 2013 . It doesn't have PSP/AGESA. That being said you will still need to flash the firmware chip with the open source coreboot firmware using a hardware flash programmer like a bus pirate or a CH341A. This is because the proprietary UEFI/BIOS that ships with the laptop obviously can't be trusted.
Good luck finding of one these systems. People like me and other security experts buy these systems up and sell them to high end clients.
P.S. If we are being honest with ourselves we know that these is advanced tech that the cabal and white hats have that can read data off of any publicly available digital computer regardless of the security used. How else was Q team able to "have it all" if they couldn't at least do that plus a lot more? If they can take down a 6000 year old death cult full of trillionairs then they are more powerful and more intelligent than you can imagine.
Are AMD chips any better? Thought I remembered reading that AMD was one of the only chipmakers that didn't have a CIA/Mossad connection but that may have changed.
My question is, are they installed in every freaking computer or cell phone because we can walk into any store and purchase something (Trump could too) and how do they know when or where someone would purchase a computer?
Always remember that whatever tools of Information War the Cabalists created, the Patriots in the Q Team undoubtedly have access to now. The White Hats intentionally encouraged the rapid development of modern computer hardware and software of all shapes and sizes over the past 60 years. Recall what Q told us about the NSA, and who Snowden really was, and what is true purpose really was. He was sent to the NSA to throw a wrench in the White Hat surveillance operation.
When Q tells us that the Patriots are in control, and that the Patriots have it all, I think the referenced story above is exactly why. If you and I have a compromised device in our pocket, or car, or our home, guess who else does? Every antifa / blm member, every crooked politician from your local sheriff, to the members of Congress and the Senate, and every communist that has infiltrated our society and government at any other level.
Anons might not want to hear this, but this type of surveillance may very well be the only way to truly expose and put a stop to the Deep State and Cabal.
Sticky this comment 😎
Stickied!
Ive published info on Intel's ME and its three Minix instances it runs for many years, and how to shut down parts of it.... but I have no energy to share my stuff to scored, nor GA.
But I am the most qualified to comment on this site.
One esoteric fresh M.E. post I shared to scored , long ago :
https://scored.co/c/Technology/p/15Ir6wKR17/20220719-hours-ago--universal-in/c
As for the OP post... parts seem larp-y to me, though its 99% plausible as written. It just seems odd that a proven Israeli team, in Israel, that codes the Intel M.E. elements, would somehow use non-Israeli citizens and furthermore require USA security clearances.
Chances are the poster, if real, was not a principal engineer on M.E. at intel.
All tech aspects mentioned are factual, but officially a USB dongle with intel supplied crypto key must be inserted onto motherboard to allow the M.E. to be re-provisioned, altered, or even debugged. Allegedly it has no WILLFUL backdoors, but like prior hypervisers probably has stuff that looks at a interrupt time call stack for 16 pushed registers of special values to decide to move forward.
I sure hope you are right.
The scariest part is the Anon's comments are from March 2017! 😲
There’s no option but to assume that the intelligence agencies are fully aware of everything you see and do on every device at all times. They’re probably not quite there but that’s the only safe assumption.
since 2017, all this was mostly confirmed and expanded on and even mildly exploited. https://scored.co/c/GreatAwakening/p/16b6IMOo4I/intels-project-odin-is-an-unauth/c/4TtrbYuxLBH
Anything the White Hats tell you, the Black Hats also know. Do not mistake silence for inaction.
I truly hate just how accurate your statement is. Needs to be said nonetheless.
And the criminals who are raping and killing the children.
I thought the same thing
If I remember correctly, Monkey left 8kun shortly after his work with "Odin" was finished. Curious - was it the same Odin?
I don't think it's related. There isn't much info about the project on the website yet, but it sounds like the opposite of this Intel thing.
No wonder they called it Intel.
Intel Inside. Indeed.
If I'm not mistaken, Laptops/Desktops bought from System76 have the IME disabled
https://system76.com/
I remember reading this from Michael Bazzell's book "Extreme Privacy"
https://inteltechniques.com/book7.html
"Extreme Privacy: 4th Edition"
Page 15 of the pdf (Page 2 in the book) for info on Intel Management Engine
https://files.catbox.moe/adbrcp.pdf
This is what we come to GAW for.
Hey quick question, there was a post a few months back that gave every stickied post on GAW. Do you still have that link? I'm having trouble finding it
Do you mean this?
https://fatality-gaw.github.io/ALL.GREATAWAKENING.WIN.STICKIES.RELOADED.html
Yes!
Thank you ☺️
Thank q, worth looking into
Great information on system76 etc. I have to say though that Ubuntu is to be avoided these days.
It seems as if it got too popular, the company behind it (Canonical) became infiltrated and they started systematically trying to flush this distribution down the toilet.
Did you hear about the old-old scandal where the Ubuntu "Start button" on your computer was sending search info to Amazon? Literally searching your own files and Amazon got the info. That was in maybe 2014 ballpark.
There are no natively installed packages now, they are all snap packages, which is a very non linux way of doing things, causing slow opening times and, somewhat debatebly, a nefarious package manager to run (snapd).
Linux Mint is based on Ubuntu, although even they have started Linux Mint Debian Edition (Based on Debian) because they can see the writing on the wall.
Linux Mint paired with KDE Plasma desktop environment (Installed separately) and preloaded with all multimedia codecs out of the box is a far superior product to Ubuntu. Mint uses open source flatpak to accomplish what snap does when required which is not much. They specifically remove snap functionality from their distro.
Linux Mint:- https://linuxmint.com/
KDE Plasma :- https://iteroni.com/watch?v=RMXViPlehAo
The customization possible on KDE plasma is unparalleled. Everything is malleable to your will. You can have a giant start button that fills the entire screen if you want. Maybe you want Mac windows with the poxy little traffic light buttons or maybe icons from off the side of an alien spacecraft. Nested, multiple panels on every screen edge? Completely change the workflow? No probs, right from the GUI.
Wow I did not know that about Ubuntu. Thanks for all the info! I will check out Linux Mint for compatibility with what I'm working on
No probs, it's been historically so close to Ubuntu that anything that will work with Ubuntu will work with Mint.
Great info! Thanks fren!
Good points.
Don't touch my breil should be: do not touch my IT stuff.
People think I’m weird because I tape cameras and mics where feasible.
CAREFUL! You could damage your laptop!!
😂😂😂
And it could cause climate change.
I'd refer back to the Corney and Zuck appearances before Congress, where they physically covered their cameras. I ask any scoffers, if the heads of intelligence and the biggest info-gathering sites both decided that this was the only way to be sure, what else should regular old us do?
Scoffers would shut up and look for tape...
Of course cameras and mics were feasible. Been feasible for decades.
Typo.
Absolutely nobody thinks it's weird. It's a pretty mainstream thing.
I use a monitor with laptop behind, so the laptop cam is looking at a wall... As far as mic, I'm not making any interesting statements verbally. Government spying on us via our computers predates the web...
The TAO catalog had that nice thing where they'd hijack your shipment of things like routers and replace it with a pre-pwned one. Pretty sure it was Snowden who leaked that?
Also I'm pretty sure AMD has something similar called Platform Security Processor. Its there, but not nearly as blatant as Intel's is though.
Here's some interesting videos from Mental Outlaw on this subject.
https://www.youtube.com/watch?v=NwSm8GzqdBg
https://www.youtube.com/watch?v=HNwWQ9zGT-8
Also, tards saying "reroute your TCP/IP stack!" somehow missed the info that early IME chips had 3G on them. Wonder what they have now.
It's so fucking bad that the most popular operating system in the world is Minix OS, the operating system of the IME. Just as the anon said, it does not matter if you are running Win, Mac, Linux, because you are also running Minix OS on the (edit) -3 ring.
It has a permanent connection to the Ethernet port and can power up your computer when it's off amongst many other poxy attributes.
https://lunduke.substack.com/p/minix-the-most-popular-os-in-the
A cheap, still semi capable solution is an AMD FX-8350 circa 2013-14. After that you get the AMD PSP, which is a toned down version of the same thing.
Here is the motherlode on the subject:- https://libreboot.org/faq.html#intelme
I heard that companies are not happy about the disgusting holes and backdoors and it is getting turned off by some manufacturers on new devices and may be discontinued.
Would physically powering down (and unplugging) your computer at night help?
Apparently not, if you have a battery. If you're talking desktop, possibly, at least to prevent while-sleeping exploits. But it's tracking and sending everything done, regardless of vpn. Nasty.
Also remove the battery if that applies.
I read that IME needed an ethernet connection to power up your computer when it is off. It is not possible for it to turn power on over a powered down wifi adapter.
So you are probably OK overnight if not using a physical wired connection to the router.
I had not heard of any 3g or 4g capability of IME but I am by no means an expert on it. (Edit:- Seems I may be wrong but it may be Called ProV and AMT)
There is some power supplied over ethernet although I am not sure if IME can use this to run. You would be better using a wifi adapter or disconnecting the ethernet at night than the power in my understanding. Any air-gapped computer should be immune.
You would need a PoE capable switch to power up any device.. and the device would have to be capable which most systems aren't except for phones, cameras, APs... devices designed to have no power cable.
I turn off my router and all my devices at night. Id think the lack of wifi would probably be a detriment. But then all Im doing at that time is sleeping anyway.
The IME has cellular on the chip
Really. They got their bases covered, dont they?
Im not really worried about the spying. I figure Im done for if they begin rounding people up enmasse anyway. I turn wifi and devices off to limit the radiation my family soaks up in a 24 hour period.
When Patriots win this thing somethings got to be done about the radiation. Have you ever wondered about the explosion of tinnitus around the country. Im certain its the wifi and phones. I have constant tinnitus but am otherwise healthier than 90% of my age group. It began around the time wifi became ubiquitous and the phones went from flip to smart.
Yes! We have been wired Ethernet in our house for 10 years after I got sick streaming video calls all day. That year we grew a table full of tomato starts in our basement near the WiFi router and the ones closest to the router all dies, then in between ones that survived but were weak, then the decent ones were several feet further away. We are doing this to our bodies why?!
Earbuds are way worse for your ears than cans or 90s headphones.
Me too. At times it if deafening at night. My hearing is excellent and what I hear is not run of the mill tinnitus. At least I know that I am not the only one.
I did not know this.
Edit:- It seems they have some capability over 3g under AMT (Active management technology). It's hard to keep up with this shite.
As intrusive as this sounds, there are a couple of things to consider.
1.) This is more than likely using ipv4 still for traffic, most consumer routers are not using IPv6, hell most corporations are not using IPv6.
2.) The only two routing protocols most home routers understand are IPv4 or IPv6, so if there was some custom protocol it would go no where. There are a lot of network protocols, the vast majority can not be routed i.e. traverse the internet.
3.) Any good network engineer or linux guy worth his salt can and would filter weird, unrecognized outbound traffic.
4.) The addresses used for spying and control would have to be hardcoded into the chip, making it easy to filter, very doubtful it initiates any kind of tunnel, which again can be filtered.
5.) This requires using an Intel motherboard one would assume as a seprate cpu is mentioned, not a core. Lots of computers, servers, and other devices do not use intel anything.
All in all, an attack vector of this type comes across as targeting something in particular. This isn't for regular consumers, seems more like it would be against governments, utilities, and organizations of that type. Most consumers aren't that important for this kind of attack, unless everyone had an intel laptop/desktop. I see this as something to be aware of, but can be dealt with. It would be interesting to know what this chip went into, cars for example.
Devil's advocate here, although I'm tracking what you're saying, would they not have thought of this, and put in ways to hide that traffic too?
well sadly, when it comes to computers/networking, most people have the "as long as it works" mentality, and wouldn't care, much less know what to do, if netflix works, they are good. In general, with all the garbage that is going on that we know about here, the magnitudes of people that are completely ignorant, willing and unwillingly is huge, and that plays right in to it -- bread and circuses.
A compromised computer may not see the network traffic but you couldn't hide it from your switch and router. Unless it used cellular or something wireless. Or they sneak packets through popular websites like Google but the website would have to be in on it.
It was a built in feature for IT and system administrators over a decade old already
AMD also has a form of the Intel Management Engine (IME). AMD calls theirs the Platform Security Processor (PSP) also known as AMD Secure Technology. Much like Intel's solution, it is a complete system entirely isolated within the physical CPU chip.
The Intel Management Engine stuff goes back a little further than i3/i5/i7 era chips putting it about 2007-2008.
AMD had publicly started to put their "security" solution into their chips around the bulldozer era of chips 2011-2012.
Also, modern motherboards use UEFI bios which is just as worrying as all the stuff in the CPU chips.
So, what do we do? Can we burn any of that out?
There are some projects like coreboot and libreboot to counter the UEFI problem. Society is based on trust though, for example trusting UEFI vs trusting contributors to these other projects. These types of projects are not for the faint of heart. Should you try it I highly suggest a purpose built computer just for that.
Regarding the CPU chips, there's nothing you can do to the chips today. Many people use a single device these days and everything they do is on it. Having multiple devices for certain activities can help a little bit I guess but it only spreads the problem out not eliminating it.
You can always obtain older hardware to try and avoid the "features".
No. It's baked in hardware level.
Gen4 and older Intel chips do not have them.
Some Gen5 chips, (broadwell) may,
Anything post Bulldozer will have this I'm guessing however
I'm surprised that the Kali folks haven't put out an opensource version of the IME dashboard, if the spooks can access your machine from anywhere, why not a public version for me to play with?
This sounds a lot like CALEA, which requires that telecommunications carriers and manufacturers of telecommunications equipment (including ISPs and VoIP providers) design their equipment, facilities, and services to ensure that they provide law enforcement with the necessary surveillance capabilities. Fun law! Thanks, Bill Clinton!
Thank God we can talk about this without being labelled as cooky tinfoil wearing crazies.
Synth from Skycoin talked about this, part of the idea of the project was to create RISC based open source hardware chips to reduce the chance of having hardware backdoors in everything. Skywire currently runs on a few thousand Raspberry pis, works as a VPN along with being a new type of more secure internet.
I do think these things were pushed by the Q people as now they have access to everything also, who do you know that does not have a phone or computer when they said they have everything they were not joking.
I've just assumed this was the case for a long time. I'm sure AMD and Apple do the same. A few years back there was this thing I think called spectre where they found "accidental" backdoors in x86 chips. I took that as confirmation. The way I see it my door will be far from the first one knocked on anyways. Just one more thing that must be fixed when we are actually in charge.
Spectre IIRC was the justification used to implement heavier (and extremely resource intensive) security measures like core isolation.
I don't believe it has been resolved entirely without it, but I haven't checked into it in a very long time either.
If you pay for your VPN subscription with your credit card it can all be traced back to you anyway.
A VPN is an extra layer of inconvenience for governments.
If enough people use them without "anything to hide", then the government wastes time and resources chasing all that down, making requests across the world for information from VPN services, etc.
So trolling them like that is fun.
Since no one else is asking, what does ME Cleaner do?
I'll read through it some more to ascertain its capabilities, and maybe use it, because I still have my Gen1 up and running. It seems to be a very good candidate for more eh ... secure and prosperous encounters ...
It disables the intel ME.
I'm writing this on an IME disabled machine which I cleansed.
My current PC uses an AMD CPU, so I guess I'm okay for now.
AMD has its own version.
Does ME Cleaner work on it, or do I need something else?
Unlikely unless they have support for it, as they would have different micro code. I'm not even convinced of the efficacy of that however.
The good guys knew for YEARS that this was happening. I heard about this in the early 2k's, so it goes beyond the 15 years this guy is talking about. Also, PBX's are 100% compromised with back doors as well, and I've known about that since the mid 90s. Lucent technologies PBX's were a nightmare for the US Government when they found out about the embedded back doors that were all on Chinese made chips.
Cryptocurrency fags btfo. You cannot trust computers!
I wonder how far back this goes...In other words, besides the "clipper chip" thing we all heard about years ago, I wonder if this crap is not present in say an XP era processor. Anybody know? You can still run a lot of stuff on an XP era machine....I have several running legacy chit...
"I wonder how far back this goes...."
"The ME is present on all Intel desktop, mobile (laptop), and server systems since mid 2006."
https://libreboot.org/faq.html#intelme
Thanks I missed that tidbit 👍
Heh, just saw Steam won't run on anything less than windows 10 by year end. Looking into changing all remaining machines to Linux, and/or building my own. My brothers ahead of me on that.
I'm kind of an expert on this subject but I'll just cut to the chase: the newest x86 laptop with no hardware back doors is the Lenovo g505s with the AMD A10-5750M APU form 2013 . It doesn't have PSP/AGESA. That being said you will still need to flash the firmware chip with the open source coreboot firmware using a hardware flash programmer like a bus pirate or a CH341A. This is because the proprietary UEFI/BIOS that ships with the laptop obviously can't be trusted.
Youre probably going to want to run QubesOS https://www.qubes-os.org/ or openBSD https://www.openbsd.org/ or just Tails https://tails.boum.org/ if you want to keep it simple
This is probably the best info resource if you want to take on the project.
https://dangerousprototypes.com/docs/Lenovo_G505S_hacking.
Good luck finding of one these systems. People like me and other security experts buy these systems up and sell them to high end clients.
P.S. If we are being honest with ourselves we know that these is advanced tech that the cabal and white hats have that can read data off of any publicly available digital computer regardless of the security used. How else was Q team able to "have it all" if they couldn't at least do that plus a lot more? If they can take down a 6000 year old death cult full of trillionairs then they are more powerful and more intelligent than you can imagine.
Kinda fun how Spectra and Meltdown happened just a little while before this, thus eliminating the "olden methods" of spycraft...
This shit started with SKYLAKE GENERATION OF CPUS.
ANY CHIPP DDR4 OR NEWER HAS THESE CAPABILITIES.
it was sold as a benefit for system administrators.
Phew, i9s are safe. Everyone buy a 13900K!
Are AMD chips any better? Thought I remembered reading that AMD was one of the only chipmakers that didn't have a CIA/Mossad connection but that may have changed.
AMD has something similar to IME https://en.wikipedia.org/wiki/AMD_Platform_Security_Processor
As for whether it has been used by the five eyes...no idea.
Hardware is easy for anyone to access if they have the skill.
Switching to different hardware is also a possibility even with only two or three major CPU manufacturers.
All you can do is switch to alternatives.
Do AMD boards have the same?
Yes. It's here in this thread.
My question is, are they installed in every freaking computer or cell phone because we can walk into any store and purchase something (Trump could too) and how do they know when or where someone would purchase a computer?
Unless every single one already got it!
purism phone doesn't have it.
It seems pre 2013 devices can do a couple of things to shut it down. https://www.techpowerup.com/forums/threads/asrock-z370-z390-taichi-and-some-others-actively-modding-firmware-with-intel-management-engine-disabled-new-method.259319/
Thanks Catsfive. Appreciate this.
Been talking about this for years and years
Ironically Lenovo laptops have a physical switch to disconnect the camera.
All computers with a built in cam have a hardware switch. The same for the mic. All you have to do it cut the wire and use a USB device if needs be.
This is why people solder physical switches into their microphone and camera circuits. Call them tin-foil hatters, but they know what’s possible.
What about AMD CPU’s
just as compromised.
Either
They sold out freedom for a pay check.
Or they defended freedom without demanding a pay check
The ones that didn't know were just tools.
I wonder if Apple silicon is free of this? At least for the time being?
I'm running a 10 year old system with win 7. No mic or camera that I'm aware off.
Win7 is currently unsupported, and receiving no updates. You're super vulnerable to 0-days as they happen
Looks like I apply “pull and pray” when i build my new rig all amd… Though, its probably the same shit
It's this related to Ron Watkins project Odin?