Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer.
The same way AMD was able to change the crypto algorithms for the Zen chip they licensed to China, they can change how the CPU behaves at any system, even those already deployed. This can also be used to sabotage any program or computation, making BadBIOS vastly nastier than Stuxnet.
American military made a grave mistake to partner with the morons of the Brazilian military, who are letting knowledge of this spread like a fire (and misusing it for petty profit and inside jobs to justify a police state). Israel, UK and France also have access, but are much more professional.
>this shit again
>dude trust me
You can bump, but don't make duplicates.
Moved to >>1509 (OP)
/x/ the /tech/ thread.
>what is network monitoring and DPI?
They probably just rootkit the uefi-bios. Most uefi can boot to network, so they must have network libraries to read and decode packets. You're telling me the Fed CIA can't implant someone at one of the 3 companies that make motherboard software?
*laughs in ARM Cortex-A7*
Isn't ARM has something similar like PSP or ME? They called it the TrustZone and I quite skeptical about what it does. Also, just few years ago ARM processor has some major outbreak of CVE related to side channel attack.
It's not equivalent to ME/PSP, which is why I bought an ARM system. :-)
Some ARM processors are vulnerable to Spectre class attacks, and others that exploit the speculative execution nature of the affected processors. Most newer ARM Cortex-A series are speculative, in fact, which is why I avoid them. But Cortex-A7 and Cortex-A53 simply do linear fetch/decode/execute, without any kind of speculation.
That's not to say there can't be other CPU bugs, but I'm not aware of any major processor exploits for those two (A7 and A53) or older ones like ARM7 & ARM9 (but those ones are much less powerful).
And of course, other components can be attacked, like for example as Rowhammer does the DDR3/DDR4 memory. I thought about buying an old board Olimex sells that has non-vulnerable DDR2 memory, but it's a pretty big drop in performance from my 1 GHz dual core Cortex-A7 to that board's ARM926J clocked at 454 MHz, and since it only has 64 MB RAM the board can only run very old kernels specifically built for embedded Linux (and forget about OpenBSD, they just don't support it at all!)