-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I am requesting FreedomBox to ask Marvell and ARM if their processors have a backdoor. Another method of tracking the PSN of a processor is via the processor's backdoor.
AMD has two backdoors: DASH and a very large encrypted debugger. Debuggers enable execution of code. They are a backdoor. In 2010, a Russian discovered the Debugger. AMD admitted the debugger but did not disclose more information. It is unknown what year AMD installed the debugger in its processors. http://www.i-programmer.info/news/91-hardware/1586-secret-debug- registers-in-amd-processors.html AMD DASH is modeled after Intel's Active Management Technology (AMT). The published purpose of both is to enable "IT administrators" complete remote access to the computers even if they are turned off. It is frightening what the access provides: out of band connection, Wake on LAN (WOW), remote turning off of computers, remote booting to another OS, tampering with the BIOS and OS, etc. Neither AMD nor Intel provide any notification to the computers that they have been accessed or tampered with. The out of band connection and tampering is virtually undetectable. http://www.fic.com.tw/product/AMT_Procedure.pdf and http://sites.amd.com/es/business/it- solutions/manageability/Pages/manageability.aspx There is third party software that can be used with AMT and DASH to provide substantial remote access to computers. Such as Altiris™ Out of Band Management Component 7.1 SP2 from Symantec http://www.symantec.com/business/support/index?page=content&pmv=prin t&impressions=&viewlocale=&id=DOC4687 "If abused, AMT offers powerful backdoor capability" invisiblethingslab.com/resources/.../Ring%20-3%20Rootkits.pdf Intel's AMT was hacked. theinvisiblethings.blogspot.com/.../vegas-toys-part-i-ring-3- tools.htm... Here's another article on hack of processor: http://news.softpedia.com/news/The-Ultimate-Backdoor-Hackers-Can- Infect-Your-Processor-83481.shtml Intel vPro makes the vPRO PSN visible to everyone vPro and Absolute's Computrace are backdoors and have been hacked. Computrace is preinstalled in the BIOS of Dell, Lenova and other computers. http://www.securityfocus.com/bid/35889/discuss and http://www.geekswithgirls.com/thetechlunch/?p=3781 and http://blog.coresecurity.com/2009/08/11/the-bios-embedded-anti- theft-persistant-agent-that-couldnt-response-handling-the-ostrich- defense/comment-page-1/ The point I am trying to make is that the manufacturer of the processor, IT administrators, government and hackers can remotely access Intel's AMT, Intel's vPRO, Absolute's Computrace, AMD's DASH and potentially AMD's debugger. The data they procure can be sold to information brokers. Investigators can procure it from information brokers and from government data basis. Please ask Marvell and ARM whether there is a backdoor out of band monitor, a debugger or an antitheft device with a visible PSN such as vPro on their processor. Thank you. -----BEGIN PGP SIGNATURE----- Charset: UTF8 Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 3.0 wsBcBAEBAgAGBQJP7HdeAAoJEMry4TZLOfxmFJsH/2Y/ETkQUjEQ2Dh0n8CcuWfSPpsg pW0vOEoa68qNUuT4DaEGE9GptT9Istcj9veElvoRxJuiNzgixHMh+dcYipTu6RMExrI0 dGxWfn7chFETknIB0YNzc8frnEJ6urUo3q3rJ6tPa4iIt9P0H1UAD+zItrtfDSILC54t ZEUleY1jQ2rWSL9lyYt9Zaozs/4We5Lc+na6edchNnxV4vKLpnmZLzn44kNzf5rWVMPC LZuf7tiopy/Fmz2Rq+NKpOlUmqvZXd3U3B5JuiZhkkyjSJlCpguXdAo27CvitxgcSrzP tFN+z5qkXKf6Cs/73ZUwlptqKE+Fsf95H3XPlR6sqDY= =1N+A -----END PGP SIGNATURE----- _______________________________________________ Freedombox-discuss mailing list [email protected] http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss
