Anonymous ID: 22dd7a April 9, 2018, 10:09 a.m. No.967325   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7351

>>967304

Oh, I'm well aware. I've had conversations with people who design motherboards for IBM and Dell. They were completely unaware of how hardware exploits work. I think it may affect their job security if they understand how pervasive it is.

 

It is possible to design secure systems even with insecure chips. However, NOBODY does this. I wonder whyโ€ฆ /sarc.

Anonymous ID: 22dd7a April 9, 2018, 10:14 a.m. No.967450   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>967390

>REGULATION OR KILL?

regulation THEN replace and kill legacy systems.

 

new standards needed:

 

1) Open specification โ† most important

2) Open source

3) Self-testing distributed network

 

Not impossible. Would greatly appreciate federal funding. I (and others) know exactly how to do this.

Anonymous ID: 22dd7a April 9, 2018, 10:18 a.m. No.967570   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>967534

It is in everything it can be in. Think of how MKULTRA was an umbrella for EVERY way to control behavior of any kind. The same thing has been done for tracking, surveillance and digital system compromise.

Anonymous ID: 22dd7a April 9, 2018, 10:21 a.m. No.967636   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7665

>>967589

Not only that, but it is a felony under federal law to change someone else's computer without their consent. Somehow I don't think their EULA is going to save them considering the violations of the constitution they require.

Anonymous ID: 22dd7a April 9, 2018, 10:25 a.m. No.967742   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7951

>>967635

>Are all the chips backdoored?

 

IMO, all of the high-speed CPUs used in desktop/laptop/notebook computers are and have been for more than a decade. Some much longer.

 

>I do know MS can access and control all OS with intel chips- mmc brings up a menu is all windoze systems.

There are exploits not only in the CPUs but in the peripheral chips. Every high speed Ethernet controller likely has the ability to send/receive/forward 'magic' packets so a sufficiently experienced hacker can zip through any firewall system. IMO, it is almost a given that the good guys and bad guys have huge software sets that do this for them so they can just bounce around through networks and look at do whatever they want without any of the machines in question being aware of it at all. (The only way to find this would be to do some incredibly expensive packet analysis, and that's difficult because the network analyzers are likely compromised to do the same thing.)

Anonymous ID: 22dd7a April 9, 2018, 10:28 a.m. No.967818   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>967665

>part of a RICO case.

IMO, if enough of the Q information is validated in public, then ALL of the high tech companies would be complicit in the RICO case. Worst case is they could deflect the blame to those higher in the hierarchy, but such a case would still be successful. Just my $0.02.