[gaia] Robert Steele: Details on NSA Backdoor in INTEL Chips
willi uebelherr <willi.uebelherr@riseup.net> Wed, 29 March 2017 18:35 UTC
Return-Path: <willi.uebelherr@riseup.net>
X-Original-To: gaia@ietfa.amsl.com
Delivered-To: gaia@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4881120046; Wed, 29 Mar 2017 11:35:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.721
X-Spam-Level:
X-Spam-Status: No, score=-2.721 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=riseup.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d06kFkCetrkx; Wed, 29 Mar 2017 11:35:12 -0700 (PDT)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A26DE129469; Wed, 29 Mar 2017 11:34:47 -0700 (PDT)
Received: from piha.riseup.net (unknown [10.0.1.163]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.riseup.net", Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK)) by mx1.riseup.net (Postfix) with ESMTPS id D58861A2266; Wed, 29 Mar 2017 18:34:46 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak; t=1490812487; bh=735FpxV/D9y1LxFnfEGgiGydGzPepPLOO517nijKx5c=; h=From:Subject:References:To:Cc:Date:In-Reply-To:From; b=E8NCN5miBYKatAeSzuX8ho42x3plRBI82qgR9NqAL3sr6Isb9rPIMgEzV07PlhxGk giAmF7dDp5QVoKjfDJT/Ak5KGbnpWAfQ2Il/EvEp2tGngChzeDJLT82cpcMq9DxU6k I94e2iIblTCgx46j2QW67OSQ2j0BUHcSEOMn8Y8Q=
Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: willi.uebelherr) with ESMTPSA id DC88B1C0633
From: willi uebelherr <willi.uebelherr@riseup.net>
References: <80744451.124562.0@wordpress.com>
To: ISOC Internet Policy <internetpolicy@elists.isoc.org>
Cc: IETF discussion <ietf@ietf.org>, IRTF discuss <irtf-discuss@irtf.org>, IRTF gaia <gaia@irtf.org>, IGF gov <governance@lists.igcaucus.org>, IGF dc <dc@intgovforum.org>, Best Bits <bestbits@lists.bestbits.net>, IUF list <iuf@lists.riseup.net>
Message-ID: <0f651625-8559-6c3d-060b-7e54230b3755@riseup.net>
Date: Wed, 29 Mar 2017 15:34:36 -0300
MIME-Version: 1.0
In-Reply-To: <80744451.124562.0@wordpress.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/gaia/wwJD_6nsE0sVSkkbmn0Q8HBRF1Y>
Subject: [gaia] Robert Steele: Details on NSA Backdoor in INTEL Chips
X-BeenThere: gaia@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Global Access to the Internet for All <gaia.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/gaia>, <mailto:gaia-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gaia/>
List-Post: <mailto:gaia@irtf.org>
List-Help: <mailto:gaia-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/gaia>, <mailto:gaia-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Mar 2017 18:35:14 -0000
Robert Steele: Details on NSA Backdoor in INTEL Chips http://phibetaiota.net/2017/03/robert-steele-details-on-nsa-backdoor-in-intel-chips/ DuckDuckGo search: NSA backdoor INTEL https://duckduckgo.com/?q=NSA+backdoor+INTEL&t=ha&ia=web Expert Says NSA Have Backdoors Built Into Intel And AMD Processors http://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/ Intel ME dumpintel and comments http://boards.4chan.org/pol/thread/117886401/intel-me Dear friends, many of us speak and write about encryption, about surveillance, about external control. Intel and Samsung, maybe also AMD, IBM/Motorola and others, have it installed. The underlayer between OS and hardware. Totally controlled from outside and independent of BIOS and OS. Intel implemented it in the i3, i5, i7. Personal PC environment. And servers and workstation? I am sure, it is the same. The decryption of the encryption makes too much effort. With ME it is easy and allways working. This is the reality, not the future. Our possible answer: Free technology. many greetings, willi -------- Forwarded Message -------- Subject: [New post] Robert Steele: Details on NSA Backdoor in INTEL Chips Date: Wed, 29 Mar 2017 11:58:39 +0000 From: Public Intelligence Blog <donotreply@wordpress.com> To: willi.uebelherr@gmail.com Post : Robert Steele: Details on NSA Backdoor in INTEL Chips URL : http://phibetaiota.net/2017/03/robert-steele-details-on-nsa-backdoor-in-intel-chips/ Posted : March 29, 2017 at 8:00 am Author : Editor Categories : Corruption, Government I have consulted with my senior NSA colleagues and they validate this information. http://phibetaiota.net/wp-content/uploads/2017/03/Intel-Inside.jpg _______________________________________________ Discussion mailing list Discussion@lists.fsfe.org https://lists.fsfe.org/mailman/listinfo/discussion
- [gaia] Robert Steele: Details on NSA Backdoor in … willi uebelherr