Anonymous ID: 24004c March 8, 2019, 8:55 p.m. No.5585382   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5407 >>5416 >>5422 >>5462 >>5537

>>5585184

 

Intel management chip has many vulnerabilities already. Clowns know of many that we won't know about. They rarely get patched on most systems.

 

They are in all business class systems for past 7-10 years, and I believe they are in a lot of other consumer stuff. Not 100% on that, need some digs.

 

The chip runs a Linux based OS and even if you PC is off it they can still get in as long as its plugged in.

 

The vulnerabilities is the bad part. We know they already have redundant back doors, but it's when even more nefarious peeps get access or big tech gangsters find exploits and don't report them. Then you have issues.

 

Even linux os is vulnerable if you have a mobo with this chip on it.

 

All servers have them.

 

I have also read that they can communicate over wireless with IOT devices and so on.

 

https://voat.co/v/technology/1500386

Intel's Management Engine can be neutralized | technology - Voat

 

Intel Management Engine Vulnerability - Remote Exploit

https://voat.co/v/news/2642070

 

Intel ME controller chip has secret kill switch | technology - Voat

 

https://voat.co/v/technology/2095801

 

 

 

Will soon be time to break out the old 386 offline only.

Anonymous ID: 24004c March 8, 2019, 9:01 p.m. No.5585462   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5513 >>5537 >>5582

>>5585382

 

Just Kidding about the 386

https://web.archive.org/web/20190309045910/https://www.reddit.com/r/technology/comments/9e16gg/hacker_finds_hidden_god_mode_on_old_x86_cpus/

 

https://web.archive.org/web20190120032446/http://www.tomshardware.co.uk/x86-hidden-god-mode,news-58952.html

 

Hacker Finds Hidden 'God Mode' on Old x86 CPUs

by Paul Wagenseil August 10, 2018 at 1:08 AM

 

LAS VEGAS โ€” Some x86 CPUs have hidden backdoors that let you seize root by sending a command to an undocumented RISC core that manages the main CPU, security researcher Christopher Domas told the Black Hat conference here Thursday (Aug. 9).

 

The backdoor completely breaks the protection-ring model of operating-system security, in which the OS kernel runs in ring 0, device drivers run in rings 1 and 2, and user applications and interfaces ("userland") run in ring 3, furthest from the kernel and with the least privileges. To put it simply, Domas' God Mode takes you from the outermost to the innermost ring in four bytes.

 

"We have direct ring 3 to ring 0 hardware privilege escalation," Domas said. "This has never been done."

 

That's because of the hidden RISC chip, which lives so far down on the bare metal that Domas half-joked that it ought to be thought of as a new, deeper ring of privilege, following the theory that hypervisors and chip-management systems can be considered ring -1 or ring -2.

 

"This is really ring -4," he said. "It's a secret, co-located core buried alongside the x86 chip. It has unrestricted access to the x86."

 

The good news is that, as far as Domas knows, this backdoor exists only on VIA C3 Nehemiah chips made in 2003 and used in embedded systems and thin clients. The bad news is that it's entirely possible that such hidden backdoors exist on many other chipsets.

 

"These black boxes that we're trusting are things that we have no way to look into," he said. "These backdoors probably exist elsewhere."

 

Domas discovered the backdoor, which exists on VIA C3 Nehemiah chips made in 2003, by combing through filed patents. He found one โ€” US8341419 โ€” that mentioned jumping from ring 3 to ring 0 and protecting the machine from exploits of model-specific registers (MSRs), manufacturer-created commands that are often limited to certain chipsets.

 

Domas followed the "trail of breadcrumbs," as he put it, from one patent to another and figured out that certain VIA chipsets were covered by the patents. Then he collected many old VIA C3 machines and spent weeks fuzzing code.

 

He even built a testing rig consisting of seven Nehemiah-based thin clients hooked up to a power relay that would power-cycle the machines every couple of minutes, because his fuzzing attempts would usually crash the systems. After three weeks, he had 15 GB of log data โ€” and the instructions to flip on the backdoor in the hidden RISC chip.

 

"Fortunately, we still need ring 0 access to start the launch process, right?" Domas asked. "No. Some of the VIA C3 x86 processors have God Mode enabled by default. You can reach it from userland. Antivirus software, ASLR and all the other security mitigations are useless."

 

Domas has put all his research, plus tools to check whether your VIA C3 CPU might have an undocumented coprocessor and to disable the coprocessor by default, up on his GitHub page.

Anonymous ID: 24004c March 8, 2019, 9:06 p.m. No.5585537   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5582

>>5585382

>>5585462

>>5585184

>>5582182 lb

 

One more reason why we need to get IBOR into play.

 

Are there any IBORfags out and about?

 

Do we have IBORfags? Cause we should.

 

Quick search: Petition with only 32,874 signed.

https://petitions.whitehouse.gov/petition/internet-bill-rights-2

 

Let's get this up to 100000 in the next couple of days faggots. Get in here.

 

And found a link to all the Q cards. Awesome.

 

Baker - Should we consider adding the IBOR to the dough so we can get the petition over the top? notable?

Anonymous ID: 24004c March 8, 2019, 9:10 p.m. No.5585582   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5610 >>5713

>>5585462

>>5585513

 

Tech is a tragedy right now.

 

Saw this coming a long time ago, lots of us did.

We are at the apex of shit tech right now, and the big global tech corps are going to keep fucking us unless we stand up for ourselves.

 

Sign that IBOR today.

 

Anons have a link to any progress on actually writing out the basic framework of what IBOR should look like? Is there something buried on this board?

 

 

>>5585537

Anonymous ID: 24004c March 8, 2019, 9:20 p.m. No.5585707   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Never heard of this before. Has some links to citations on the article:

 

Alaska is an area of the planet that is as interesting as its terrain is unforgiving. Perhaps the claims of an ancient black pyramid buried deep under the state are some of the most bizarre and intriguing.[7]

 

http://listverse.com/2017/10/08/10-alleged-top-secret-bases-that-officially-dont-exist/

 

And some more underground info / links WW

 

http://www.subterraneanbases.com/underground-bases-the-list/

 

The claims first surfaced in 1992, when Channel 13 Anchorage aired a report on scientists conducting seismic recording experiments, who believed theyโ€™d inadvertently discovered the dimensions of a pyramid structure around 80 kilometers (50 mi) from Denali (formerly Mount McKinley). Nothing much more came of the story, until two decades later in 2012, when a member of the military (now retired) contacted UFO researcher and journalist Linda Moulton Howe with information on the alleged find. He claimed the pyramid was built thousands and thousands of years ago and was constructed to harness the natural power of the planet.

 

As Howe broke the story into the public arena, more people came forward who had been involved in, or were directly related to someone involved in, the Black Pyramid. A gentleman named Bruce L. Pearson claimed the structure was โ€œnot made by manโ€ and was being used as a secret base to study the harnessing of such power. Another anonymous witness claimed his father had worked on the โ€œdark pyramid,โ€ even helping to install a โ€œpowerful electrical systemโ€ within its ancient structure.