Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Qualcomm joins Intel, Apple, Arm, AMD in confirming its CPUs suffer hack bugs, too
The Register ^ | 1/6/18 | Shaun Nichols

Posted on 01/05/2018 6:07:45 PM PST by markomalley

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-27 last
To: ransomnote
Found it:

Clipper chip



The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency[1] (NSA) as an encryption device that secured “voice and data messages."[2], with a built-in backdoor. It was intended to be adopted by telecommunications companies for voice transmission. It could not only encode messages but decode them as well. It was part of a Clinton Administration program to “allow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions."[2] “Each clipper chip ha[d] a unique serial number and a secret ‘unit key,’ programmed into the chip when manufactured."[2] This way, each device was meant to be different from the next.

21 posted on 01/06/2018 12:50:07 AM PST by Bikkuri
[ Post Reply | Private Reply | To 20 | View Replies]

To: Bikkuri

Good info but *facepalm* ....it’s not good news is it? I mean I have been telling people that we have no privacy anymore but I didn’t know one day I’d be looking at the chip on FR. Thanks. *sigh*


22 posted on 01/06/2018 12:57:29 AM PST by ransomnote
[ Post Reply | Private Reply | To 21 | View Replies]

To: ransomnote
AS far as this goes publicly, it was supposedly shut down when the public found out about it.. Around that time, there was also Carnivore.
I think the Canadian government took it after the FBI was caught using it...

ALSO:
PRISM (surveillance program), started in 2007..

I am sure there are many more out there still unknown to us (recent data-dump, in the last couple of months, made public many of the programs/hack software that the CIA/NSA/etc. have been using to get into our computers/phones).

I saw this coming back in the 80's, even warned my friends that it would become a problem (including social sites), even before we had the WWW. They all thought I was a tin-foil hat wearer :p
I have been careful since then (80's) to keep as much personal info off the net as possible.
It seems it has paid off... Every once in awhile I will do a search and come up with 10s, if not 100s, of people with the same name... but the only thing that shows up referring me, is a Minor in Possession of Alcohol I got when I was in Uni... hehe..
23 posted on 01/06/2018 1:21:47 AM PST by Bikkuri
[ Post Reply | Private Reply | To 22 | View Replies]

To: Bikkuri

That’s why I hate the cloud computing mantra - oh yes let’s put my data out there so EVERYONE can access it more easily.


24 posted on 01/06/2018 1:26:09 AM PST by ransomnote
[ Post Reply | Private Reply | To 23 | View Replies]

To: ransomnote

I actually FINALLY started using the ‘Cloud’, but only for my pics and photoshops. I also left 1 text file in there; when opened, it reads: “Suck on this Libtards!”

:D


25 posted on 01/06/2018 1:42:51 AM PST by Bikkuri
[ Post Reply | Private Reply | To 24 | View Replies]

To: Bikkuri

You rascal, You!


26 posted on 01/06/2018 1:44:54 AM PST by ransomnote
[ Post Reply | Private Reply | To 25 | View Replies]

To: markomalley

https://www.amd.com/en/corporate/speculative-execution

An Update on AMD Processor Security | AMD

There has been recent press coverage regarding a potential security issue related to modern microprocessors and speculative execution. Information security is a priority at AMD, and our security architects follow the technology ecosystem closely for new threats.

It is important to understand how the speculative execution vulnerability described in the research relates to AMD products, but please keep in mind the following:

The research described was performed in a controlled, dedicated lab environment by a highly knowledgeable team with detailed, non-public information about the processors targeted.
The described threat has not been seen in the public domain.

When AMD learned that researchers had discovered a new CPU attack targeting the speculative execution functionality used by multiple chip companies’ products, we immediately engaged across the ecosystem to address the teams’ findings.

The research team identified three variants within the speculative execution research. The below grid details the specific variants detailed in the research and the AMD response details.
Variant / AMD Response Matrix
Google Project Zero (GPZ) Research Title Details
Variant One Bounds Check Bypass Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected.
Variant Two Branch Target Injection Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.
Variant Three Rogue Data Cache Load Zero AMD vulnerability due to AMD architecture differences.

(Whatever all that means!)


27 posted on 01/06/2018 5:28:29 AM PST by daniel1212 (Trust the risen Lord Jesus to save you as a damned and destitute sinner + be baptized + follow Him)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-27 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson