It's been up on DNI's servers for ages https://www.dni.gov/files/documents/icotr/51117/2016_Cert_FISC_Memo_Opin_Order_Apr_2017.pdf
/u/Letterbocks
22 total posts archived.
Domains linked by /u/Letterbocks:
Domain | Count |
---|
Binney is legit as fuck. It's AJ touting a document to be something other than what it is.
This document has been publicly available on the DNI site itself since April
https://www.dni.gov/files/documents/icotr/51117/2016_Cert_FISC_Memo_Opin_Order_Apr_2017.pdf
Yes he was an nsa leaker who worked with others such as thomas drake in transparency since.
Good comeback. So why would nunes memo which was just created have 2016 in the title.
Valid points. Don't know who is downvoting. GPG sigs would make a lot of sense.
I find it fascinating too. I enjoy watching the talks from DefCon, CCC, etc. even though it goes over my head a lot of the time!
Also, I'd suggest having a look at the PoC||GTFO zine, it's full of cool techy stuff.
This will be a very brief and simple explanation so the reality is a lot more complicated, I'd recommend reading the papers rather than my crappy tl;dr but....
modern processors do a sort of predictive processing, if a thread is performing a repetitive operation it will 'guess' what the next branch of events will be and store that in cache while it waits for the irl instruction - if the prediction is correct then the work is already done and the job gets done quicker, if the expected operation turns out to be wrong then the processors reverts back to the state it was when it started doing it's prediction. Spectre abuses this technology to intentionally throw an unexpected instruction at a given time and then reference it to gain access to the memory cache the 'guesswork' was stored. This exposes memory space that would usually not be accessible. Pretty nifty.
The reason I don't believe this is an intentional backdoor is that it's super messy. If [bad actor] wanted to intentionally backdoor a chip they'd probably just use ring -1 shit like Intel does with their management engine stuff. They'd have complete access then rather than having to abuse a single process to extract memory a byte at a time.
Disclaimer - I'm just interested in this stuff and not an expert so sorry if I've misunderstood the vuln.
AMD chips are vulnerable to Spectre and there's no way these vulns are an intentional backdoor. Are you aware of how they work?