[gaia] Robert Steele: Details on NSA Backdoor in INTEL Chips

willi uebelherr <willi.uebelherr@riseup.net> Wed, 29 March 2017 18:35 UTC

Return-Path: <willi.uebelherr@riseup.net>
X-Original-To: gaia@ietfa.amsl.com
Delivered-To: gaia@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4881120046; Wed, 29 Mar 2017 11:35:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.721
X-Spam-Level:
X-Spam-Status: No, score=-2.721 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=riseup.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d06kFkCetrkx; Wed, 29 Mar 2017 11:35:12 -0700 (PDT)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A26DE129469; Wed, 29 Mar 2017 11:34:47 -0700 (PDT)
Received: from piha.riseup.net (unknown [10.0.1.163]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.riseup.net", Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK)) by mx1.riseup.net (Postfix) with ESMTPS id D58861A2266; Wed, 29 Mar 2017 18:34:46 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak; t=1490812487; bh=735FpxV/D9y1LxFnfEGgiGydGzPepPLOO517nijKx5c=; h=From:Subject:References:To:Cc:Date:In-Reply-To:From; b=E8NCN5miBYKatAeSzuX8ho42x3plRBI82qgR9NqAL3sr6Isb9rPIMgEzV07PlhxGk giAmF7dDp5QVoKjfDJT/Ak5KGbnpWAfQ2Il/EvEp2tGngChzeDJLT82cpcMq9DxU6k I94e2iIblTCgx46j2QW67OSQ2j0BUHcSEOMn8Y8Q=
Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: willi.uebelherr) with ESMTPSA id DC88B1C0633
From: willi uebelherr <willi.uebelherr@riseup.net>
References: <80744451.124562.0@wordpress.com>
To: ISOC Internet Policy <internetpolicy@elists.isoc.org>
Cc: IETF discussion <ietf@ietf.org>, IRTF discuss <irtf-discuss@irtf.org>, IRTF gaia <gaia@irtf.org>, IGF gov <governance@lists.igcaucus.org>, IGF dc <dc@intgovforum.org>, Best Bits <bestbits@lists.bestbits.net>, IUF list <iuf@lists.riseup.net>
Message-ID: <0f651625-8559-6c3d-060b-7e54230b3755@riseup.net>
Date: Wed, 29 Mar 2017 15:34:36 -0300
MIME-Version: 1.0
In-Reply-To: <80744451.124562.0@wordpress.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/gaia/wwJD_6nsE0sVSkkbmn0Q8HBRF1Y>
Subject: [gaia] Robert Steele: Details on NSA Backdoor in INTEL Chips
X-BeenThere: gaia@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Global Access to the Internet for All <gaia.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/gaia>, <mailto:gaia-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gaia/>
List-Post: <mailto:gaia@irtf.org>
List-Help: <mailto:gaia-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/gaia>, <mailto:gaia-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Mar 2017 18:35:14 -0000

Robert Steele: Details on NSA Backdoor in INTEL Chips
http://phibetaiota.net/2017/03/robert-steele-details-on-nsa-backdoor-in-intel-chips/

DuckDuckGo search: NSA backdoor INTEL
https://duckduckgo.com/?q=NSA+backdoor+INTEL&t=ha&ia=web

Expert Says NSA Have Backdoors Built Into Intel And AMD Processors
http://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/

Intel ME dumpintel and comments
http://boards.4chan.org/pol/thread/117886401/intel-me


Dear friends,

many of us speak and write about encryption, about surveillance, about 
external control. Intel and Samsung, maybe also AMD, IBM/Motorola and 
others, have it installed. The underlayer between OS and hardware. 
Totally controlled from outside and independent of BIOS and OS.

Intel implemented it in the i3, i5, i7. Personal PC environment. And 
servers and workstation? I am sure, it is the same.

The decryption of the encryption makes too much effort. With ME it is 
easy and allways working. This is the reality, not the future.

Our possible answer: Free technology.

many greetings, willi



-------- Forwarded Message --------
Subject: [New post] Robert Steele: Details on NSA Backdoor in INTEL Chips
Date: Wed, 29 Mar 2017 11:58:39 +0000
From: Public Intelligence Blog <donotreply@wordpress.com>
To: willi.uebelherr@gmail.com

Post       : Robert Steele: Details on NSA Backdoor in INTEL Chips
URL        : 
http://phibetaiota.net/2017/03/robert-steele-details-on-nsa-backdoor-in-intel-chips/
Posted     : March 29, 2017 at 8:00 am
Author     : Editor
Categories : Corruption, Government

I have consulted with my senior NSA colleagues and they validate this 
information.

http://phibetaiota.net/wp-content/uploads/2017/03/Intel-Inside.jpg


_______________________________________________
Discussion mailing list
Discussion@lists.fsfe.org
https://lists.fsfe.org/mailman/listinfo/discussion