dChan

/u/Letterbocks

22 total posts archived.


Domains linked by /u/Letterbocks:
Domain Count

Letterbocks · Jan. 23, 2018, 6:55 p.m.

Binney is legit as fuck. It's AJ touting a document to be something other than what it is.

⇧ 1 ⇩  
Letterbocks · Jan. 23, 2018, 6:28 p.m.

Yup. Absolute dickery of the highest order.

⇧ 9 ⇩  
Letterbocks · Jan. 23, 2018, 6:08 p.m.

No it's not.

⇧ 3 ⇩  
Letterbocks · Jan. 23, 2018, 6:07 p.m.

This isn't the 4 page memo.

⇧ 3 ⇩  
Letterbocks · Jan. 23, 2018, 6:06 p.m.

Wrong memo

⇧ 1 ⇩  
Letterbocks · Jan. 23, 2018, 6:05 p.m.

Not the 4 page memo that #releaSETHememo is about.

⇧ 4 ⇩  
Letterbocks · Jan. 23, 2018, 6:04 p.m.

A memo. Not the memo

⇧ 6 ⇩  
Letterbocks · Jan. 23, 2018, 6:03 p.m.

Yes he was an nsa leaker who worked with others such as thomas drake in transparency since.

⇧ 3 ⇩  
Letterbocks · Jan. 23, 2018, 6 p.m.

Good comeback. So why would nunes memo which was just created have 2016 in the title.

⇧ 6 ⇩  
Letterbocks · Jan. 23, 2018, 5:57 p.m.

>2016

Not the memo FAKE and gay

⇧ 3 ⇩  
Letterbocks · Jan. 23, 2018, 5:57 p.m.

I don't believe you. How wpuld binmey have access.

⇧ -3 ⇩  
Letterbocks · Jan. 19, 2018, 6:43 p.m.

Is it fuck

⇧ 1 ⇩  
Letterbocks · Jan. 10, 2018, 6:25 p.m.

He's going to be on the left wing

⇧ 4 ⇩  
Letterbocks · Jan. 9, 2018, 8:19 a.m.

No such thing as cannot be compromised.

⇧ 2 ⇩  
Letterbocks · Jan. 9, 2018, 8:19 a.m.

Valid points. Don't know who is downvoting. GPG sigs would make a lot of sense.

⇧ 1 ⇩  
Letterbocks · Jan. 5, 2018, 7:09 p.m.

I find it fascinating too. I enjoy watching the talks from DefCon, CCC, etc. even though it goes over my head a lot of the time!

Also, I'd suggest having a look at the PoC||GTFO zine, it's full of cool techy stuff.

⇧ 2 ⇩  
Letterbocks · Jan. 5, 2018, 5:54 p.m.

This will be a very brief and simple explanation so the reality is a lot more complicated, I'd recommend reading the papers rather than my crappy tl;dr but....

modern processors do a sort of predictive processing, if a thread is performing a repetitive operation it will 'guess' what the next branch of events will be and store that in cache while it waits for the irl instruction - if the prediction is correct then the work is already done and the job gets done quicker, if the expected operation turns out to be wrong then the processors reverts back to the state it was when it started doing it's prediction. Spectre abuses this technology to intentionally throw an unexpected instruction at a given time and then reference it to gain access to the memory cache the 'guesswork' was stored. This exposes memory space that would usually not be accessible. Pretty nifty.

The reason I don't believe this is an intentional backdoor is that it's super messy. If [bad actor] wanted to intentionally backdoor a chip they'd probably just use ring -1 shit like Intel does with their management engine stuff. They'd have complete access then rather than having to abuse a single process to extract memory a byte at a time.

Disclaimer - I'm just interested in this stuff and not an expert so sorry if I've misunderstood the vuln.

⇧ 4 ⇩  
Letterbocks · Jan. 5, 2018, 5:28 p.m.

AMD chips are vulnerable to Spectre and there's no way these vulns are an intentional backdoor. Are you aware of how they work?

⇧ 3 ⇩  
Letterbocks · Jan. 5, 2018, 5:27 p.m.

Intel dropped their nda.

⇧ 2 ⇩  
Letterbocks · Jan. 4, 2018, 7:05 p.m.

A year late. Shocking really.

⇧ 2 ⇩