[Freedombox-discuss] Tracking v ia processors' backdoors
-----BEGIN PGP SIGNED MESSAGE-----
I am requesting FreedomBox to ask Marvell and ARM if their
processors have a backdoor. Another method of tracking the PSN of a
processor is via the processor's backdoor.
AMD has two backdoors: DASH and a very large encrypted debugger.
Debuggers enable execution of code. They are a backdoor. In 2010, a
Russian discovered the Debugger. AMD admitted the debugger but did
not disclose more information. It is unknown what year AMD
installed the debugger in its processors.
AMD DASH is modeled after Intel's Active Management Technology
(AMT). The published purpose of both is to enable "IT
administrators" complete remote access to the computers even if
they are turned off. It is frightening what the access provides:
out of band connection, Wake on LAN (WOW), remote turning off of
computers, remote booting to another OS, tampering with the BIOS
and OS, etc. Neither AMD nor Intel provide any notification to the
computers that they have been accessed or tampered with. The out of
band connection and tampering is virtually undetectable.
There is third party software that can be used with AMT and DASH to
provide substantial remote access to computers. Such as Altiris?
Out of Band Management Component 7.1 SP2 from Symantec
"If abused, AMT offers powerful backdoor capability"
Intel's AMT was hacked.
Here's another article on hack of processor:
Intel vPro makes the vPRO PSN visible to everyone vPro and
Absolute's Computrace are backdoors and have been hacked.
Computrace is preinstalled in the BIOS of Dell, Lenova and other
and http://www.geekswithgirls.com/thetechlunch/?p=3781 and
The point I am trying to make is that the manufacturer of the
processor, IT administrators, government and hackers can remotely
access Intel's AMT, Intel's vPRO, Absolute's Computrace, AMD's DASH
and potentially AMD's debugger. The data they procure can be sold
to information brokers. Investigators can procure it from
information brokers and from government data basis.
Please ask Marvell and ARM whether there is a backdoor out of band
monitor, a debugger or an antitheft device with a visible PSN such
as vPro on their processor. Thank you.
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 3.0
-----END PGP SIGNATURE-----