My pet rock Gordon asserts that every networked device has
a backdoor. and the Therefore, anything viewable in clear
on that device is insecure quality of message encryption is moot.
My pet rock Gordon asserts that every networked device has a backdoor.
Therefore, anything viewable in clear on that device is insecure and the quality of message encryption is moot.
Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor.meet me half way
Therefore, anything viewable in clear on that device is insecure and the
quality of message encryption is moot.
Well I would say Gordon could be correct. I say that due to
Intel ME and probably AMD SE:
Well I would say Gordon could be correct. I say that due to
Intel ME and probably AMD SE:
On Fri, 11 Oct 2024 14:52:47 -0000 (UTC), John McCue wrote:
Well I would say Gordon could be correct. I say that due to
Intel ME and probably AMD SE:
The Intel ME can be disabled in the motherboard BIOS. Whenever
I build a new machine it is one of the first things that I
disable.
Also, the Linux kernel can be configured and built without
the MEI driver by disabling CONFIG_INTEL_MEI, which is located
here:
drivers/misc/mei
ISTM that a secure payload would need to be encrypted on a stand-alone machine, air-gapped and never to be connected online.
Farley Flud <ff@linux.rocks> wrote:
The Intel ME can be disabled in the motherboard BIOS. Whenever
I build a new machine it is one of the first things that I
disable.
No. The interface that makes the ME visible to the operating system
can be disabled, but the ME is still down there doing whatever
undocumented things it does. If it wasn't, the processor would never
be able to load the microcode in the first place.
My pet rock Gordon asserts that every networked device has a backdoor. Therefore, anything viewable in clear on that device is insecure and the quality of message encryption is moot.
Sylvia Else wrote:
On 11-Oct-24 10:17 pm, Sn!pe wrote:i have nothing to hide so i don't do anything
My pet rock Gordon asserts that every networked device has a backdoor.
Therefore, anything viewable in clear on that device is insecure and the >>> quality of message encryption is moot.
An initial question is what exactly is meant by "backdoor". Any
networked device that is capable of remote update by the vendor can
presumably be updated by the vendor to do anything that any device on
your network can do. But this does not imply that anyone else can do
that. Of course it does mean that you security depends on the security
of the vendor, which is an unknown quantity. This is partly why the
few remotely updatable devices that I do own are fire-walled off from
the rest of my internal network.
Few networked devices accept incoming connections, for the simple
reason that they're unlikely to get past a gateway router. Most work
by making outgoing connections to the vendor's server. The better
implementations require an authenticated server certificate, which
makes impersonation of the vendor pretty much impossible. Without a
certificate the intending intruder may engage in something like a DNS
cache poisoning attack, but they have become more difficult over the
years.
If one is to worry about back-doors, the main vulnerability is the
router itself, and this has indeed been a problem in the past,
especially where the ISP has the ability to update firmware or change
settings, because now one is dependent on the security of the ISP,
which is not always been up to the task.
Commercially supplied routers have a bad record of vulnerabilities. I
use a small single board computer as a gateway instead.
Sylvia.
My pet rock Gordon asserts that every networked device has a backdoor.
On Fri, 11 Oct 2024 15:17:35 +0100, Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor.
Is Gordon a networked device? How did it communicate that message to you?
% wrote:
candycanearter07 wrote:
% <pursent100@gmail.com> wrote at 15:18 this Friday (GMT):the north arctic
Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor. >>>>> Therefore, anything viewable in clear on that device is insecure and >>>>> themeet me half way
quality of message encryption is moot.
Where would that be?
no , the north atlantic , sorry
candycanearter07 <candycanearter07@candycanearter07.nomail.afraid>
wrote:
Lawrence D'Oliveiro <ldo@nz.invalid> wrote at 06:18 this Monday (GMT):
On Fri, 11 Oct 2024 15:17:35 +0100, Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a
backdoor.
Is Gordon a networked device? How did it communicate that message to
you?
A networked rock?
Gordon is a primary node on the Extranet but he and I have a direct P2P telepathic link for a shorter ping.
Of course, he's as solid as a rock; not that we worry about lack
of privacy. As everybody should know, privacy is utterly dead
and security is naught but an illusion.
Scott Dorsey <kludge@panix.com> wrote:
Sn!pe <snipeco.1@gmail.com> wrote:
Of course, he's as solid as a rock; not that we worry about lack
of privacy. As everybody should know, privacy is utterly dead
and security is naught but an illusion.
And a rock feels no pain. And an island never cries.
--scott
True, that, although Gordon is quite empathetic. To expect
sympathy is going a bit far though, he's seen it all before.
Anyway, he is my rock. ≈:o)
Sn!pe <snipeco.2@gmail.com> wrote at 01:03 this Wednesday (GMT):
Scott Dorsey <kludge@panix.com> wrote:
Sn!pe <snipeco.1@gmail.com> wrote:
Of course, he's as solid as a rock; not that we worry about lack
of privacy. As everybody should know, privacy is utterly dead
and security is naught but an illusion.
And a rock feels no pain. And an island never cries.
--scott
True, that, although Gordon is quite empathetic. To expect
sympathy is going a bit far though, he's seen it all before.
Anyway, he is my rock. ≈:o)
Pet rocks are always cute :)
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 388 |
Nodes: | 16 (2 / 14) |
Uptime: | 05:53:29 |
Calls: | 8,220 |
Calls today: | 18 |
Files: | 13,122 |
Messages: | 5,872,261 |
Posted today: | 1 |