“We now know that it monitors (at the very least) every keystroke, it theoretically allows access to not only every piece of hardware connected to the system bus, but also to every byte of memory currently in use (even while the machine is running). The motherboard provides access to all hardware including memory, the CPU to special software and compute abilities and communications allows it to send and receive behind the scenes”.
CBS computers Vpro back door hacked
Read the news about the new Intel i3, i5, i7 CPU’s with built in back doors.
If you care about freedom and security as well as privacy do not use the new Intel CPU’s in your computer. Better to use an older computer at this point. I would also NOT use any Microsoft product like MS Windows XP, 7, 8. Microsoft office probably also has back doors built in. I would assume all the big Antivirus companies have back doors into the computer written into the code. Newer printers and network devices all have the ability to phone home and, most likely, allow an inbound connection.
Hell at this point I can’t even tell you that Linux is without back doors. Who has time and the knowledge to search 10,000,000 lines of open source code and look for one bug or back door?
Best practice:
Run an older laptop with a ??? CPU or older AMD CPU. Boot to a linux “live” distro CD/USB (not ubuntu), enable the firewall, do not install an AV client and use an overseas VPN while surfing. I would also disable the wifi and use a cat5 cable. Turn off when done and remove battery and wall AC. Never let the laptop be out of your sight just take it with you.
You must assume all cable modems, satellite modems, DSL modems, routers and fios has a back door built in to allow a connection to your computer. Remember firewalls block ports and this spy equipment does’nt run on a port it runs out of band and bypasses all known detection.
At this point trust nothing!
Delta01
How to Disable Intel Active Management
Disable Intel Active Management through your motherboard’s BIOS configuration utility. My guess is the Fed can turn it on even if its off.
Tip
- If your computer has an Intel motherboard customized by a computer manufacturer such as Dell, HP or Lenovo, your screen may display an instruction to press a key to enter the motherboard setup utility when the computer starts. If the instruction displays a key other than “F2,” press that key.
Just 2 Cents: For OpSec I’d recommend Tails software and Tor Browser on flash drive as a ‘plug-n-play’ option. As a more in depth option, (very in-depth) build an ArchLinux OS.
God Bless from the Southern Redoubt.
This is EXACTLY why paper and pencil, One-Time-Pad cipher systems must be used, rather than computer based encryption, at least for anything that you would not print on a T-shirt worn but the Director of the NSA.
This website is blocked from Romania – why?
Many thousands of hacking attempts…Thats why!