>Is it embedded in Android OS?
Glad to see people waking up to this. I've been saying this for 20 years. Every OS is compromised.
>Is it embedded in Android OS?
Glad to see people waking up to this. I've been saying this for 20 years. Every OS is compromised.
^^ THIS. Think peripheral chips and subsystems. Even the designers of the motherboards have no idea that their designs are wide open.
Oh, I'm well aware. I've had conversations with people who design motherboards for IBM and Dell. They were completely unaware of how hardware exploits work. I think it may affect their job security if they understand how pervasive it is.
It is possible to design secure systems even with insecure chips. However, NOBODY does this. I wonder whyโฆ /sarc.
>STANDARDS
standards are part of the problem. ever wonder how standards committees work? that's where most of the problem liesโฆ
>we'll retake tech fellow geek.
[likely] way ahead of you, anon. first up, DIY PCB laser printer open source for $200. then everyone can make their own computers, phones, etc.
>REGULATION OR KILL?
regulation THEN replace and kill legacy systems.
new standards needed:
1) Open specification โ most important
2) Open source
3) Self-testing distributed network
Not impossible. Would greatly appreciate federal funding. I (and others) know exactly how to do this.
The problem with killing things instantly is supply chain disruptions. You'd end up with piles of dead people all over the place from starvation and disease. This is a chess game.
It is in everything it can be in. Think of how MKULTRA was an umbrella for EVERY way to control behavior of any kind. The same thing has been done for tracking, surveillance and digital system compromise.
Not only that, but it is a felony under federal law to change someone else's computer without their consent. Somehow I don't think their EULA is going to save them considering the violations of the constitution they require.
>Are all the chips backdoored?
IMO, all of the high-speed CPUs used in desktop/laptop/notebook computers are and have been for more than a decade. Some much longer.
>I do know MS can access and control all OS with intel chips- mmc brings up a menu is all windoze systems.
There are exploits not only in the CPUs but in the peripheral chips. Every high speed Ethernet controller likely has the ability to send/receive/forward 'magic' packets so a sufficiently experienced hacker can zip through any firewall system. IMO, it is almost a given that the good guys and bad guys have huge software sets that do this for them so they can just bounce around through networks and look at do whatever they want without any of the machines in question being aware of it at all. (The only way to find this would be to do some incredibly expensive packet analysis, and that's difficult because the network analyzers are likely compromised to do the same thing.)
>Surveillance is disguised by convenience.
^ THIS is more wise than most think. The cabal cleverly took advantage of human laziness and preference for short-term gain over long term pain.
>part of a RICO case.
IMO, if enough of the Q information is validated in public, then ALL of the high tech companies would be complicit in the RICO case. Worst case is they could deflect the blame to those higher in the hierarchy, but such a case would still be successful. Just my $0.02.
>designed to store terabytes
yottabytes or zetabytes. they're WAY ahead of what is visible commercially.
dammit. made my coffee taste weird.
control, especially if you're smart.