And now for something completely different...well, not really.
For those interested in surveillance and misuse of IT. Plowed through this topic years ago, and not again, so from memory and a bit loose. And maybe things have moved on. Maybe a load of alarmist non-sense. All governments and many private organisations do it, just where does benefit and trust run out?
Summary.
Primarily about laptops circa 2009 onwards, but mobile phones could be made to behave the same I guess.
AMD and Intel CPUs. They contained two processors on the one die. The first processor is what we are all familiar with, runs your O/S, your computer. Second processor monitors the first for bad behaviour. The second processor has its own operating system for security purposes. Windows and virus software cannot detect the second processor or its software.
The second processor can be operated by a systems manager with appropriate authorisation anywhere in the world. Whole networks can be awakened for software updates etc, without firing up screens, keyboards etc. Keystrokes can be monitored, hard drives interrogated without the user knowing.
In the wrong hands the second processor is a big threat. The second processor needs power obviously. Ah, but I have unplugged my laptop. Yes, but you have an on board battery - check. I'm not connected to the internet. Yes, but the second processor, at the time, was using mobile G3 - checkmate.
Important organisations, like US military can have the second processor turned off.
Supposedly NSA budget had reference to funding the development of the second chip and software. Nice back door if you can get it.
Going to post a link here so I can easily find it again in the future.
The Trouble With Intel’s Management Engine | Hackaday
Do AMD-processors have something like Intel Management Engine? : security


Reply With Quote


Bookmarks