- Mar 20, 2000
- 102,358
- 8,447
- 126
Hey guys, can you keep it a bit more to the alleged flaws (and alleged manipulation) and less on forum drama over at [H]?
Thanks
AT Moderator ElFenix
Thanks
AT Moderator ElFenix
Is this perhaps because someone in the Israel government or system is trying to protect Israel jobs?
We know Israel feel betrayed by US after the Iranian nuclear deal.
They will try to protect themselves. They feel more alone than ever.
And that fight is now even more about jobs than military actions. Eg recently Netanyahu met the CEO of Teva a major company with demands he could not cut jobs.
Jobs is national safety.
We know the US used advanced virus and coding to blow up Iranian centrifuges.
We know the Israeli have that knowlege now. We also know the american is angry because the Israel blow the cover by using to agressive code. Didnt help the relationship.
Now one of these CTS guys is former Israel military intelligence agency. This agency certainly have the knowledge about all vulnerabilities eg in chipsets whatnot. And then some.
Now did someone from inside this agency tip these guys with the idea or some basic knowledge? Knowing full well it would go something like the "Viceroy" way. And that the net result would be favorably for Israel jobs via Intel.
The political climate and precedence is certainly there to take such actions.
Is this perhaps because someone in the Israel government or system is trying to protect Israel jobs?
We know Israel feel betrayed by US after the Iranian nuclear deal.
They will try to protect themselves. They feel more alone than ever.
And that fight is now even more about jobs than military actions. Eg recently Netanyahu met the CEO of Teva a major company with demands he could not cut jobs.
Jobs is national safety.
We know the US used advanced virus and coding to blow up Iranian centrifuges.
We know the Israeli have that knowlege now. We also know the american is angry because the Israel blow the cover by using to agressive code. Didnt help the relationship.
Now one of these CTS guys is former Israel military intelligence agency. This agency certainly have the knowledge about all vulnerabilities eg in chipsets whatnot. And then some.
Now did someone from inside this agency tip these guys with the idea or some basic knowledge? Knowing full well it would go something like the "Viceroy" way. And that the net result would be favorably for Israel jobs via Intel.
The political climate and precedence is certainly there to take such actions.
I try to bring arguments to the table. And bring a new perspective not seen elsewhere.Gee, I was thinking that it was Intel trying to smear AMD to take heat off of them (Intel) for Meltdown? I am clearly outclassed in the conspiracy department.
The question is, where did they get the source code for the bios? Or would the attacker have to use an open source BIOS, and hope its compatible with the machine being attacked?
PS: The drill press is a must have in every clean operating environment!
First, we drill into the BIOS to allow code injection...
Volume Up... he types at least a 10 character length password as near as I can tell as part of his remote in process. He says at ~4:20 he's gonna do this just like an attacker would... what attacker has the password to just type in like he does?
- Company asking for investigation of unusual stock trading
- All potential exploits to be fixed with software within weeks
CTS estimated that it would take “many months” to address the issue. The researcher didn’t give AMD that amount of time to fix the holes before drawing public attention to them, something that goes against standard practice in these situations.
“I fault CTS Labs for not following industry-standard coordinated disclosure procedure,” said Ben Gras, a researcher at Vrije University in Amsterdam who focuses on hardware security flaws. “A widely accepted practice in these situations is to coordinate with the vendor and affected parties during a window of confidentiality before publicizing security sensitive information, reducing the impact of the research while still maintaining transparency. As it stands, this leads me to believe they are not acting in good faith, and make me interpret other aspects of this report skeptically.”
Yep. Standard knowledge on the Unit 8200 trainee program
Hmm. I thought these 'experts' said it couldn't be fixed, and that was their excuse for not giving the vendor the industry standard 90 days before releasing the findings...
It is the inverse occam's razor approach.LOL That is such a whacky take on things.
Hmm. I thought these 'experts' said it couldn't be fixed, and that was their excuse for not giving the vendor the industry standard 90 days before releasing the findings...