If you had a 3G modem installed, it can officially communicate back "home" using that modem thanks to the Intel management engine. They can also do it over ethernet or wifi networking cards as well.
Unofficially I don't believe for a second though that they're limited to "3G", and that especially military could have backdoored them to communicate using any other part of the radio spectrum.
Uncle had a C64 he let me play around with back in the day, got an Apple ][e when the school was getting rid of them for $50. (They were cheap as balls and kids could write reports on them, so they hung on well into the 90s).
Sadly, my brothers and I went to live with my bitch of an aunt over some BS I wont get into, and then I got into some trouble and got put into juvie. When I asked about the thing years later, the cunt looks at me like a deer in the headlights and tells me they threw it away years ago.
shame, I had a ton of software that the teachers at the school had gotten rid of when the ][e's went, and between that and the machine, even if i had decided to sell it, I might have been sitting on a small fortune by now. Oh well.
It's possible to update the microcode firmware via OS. Linux does this by default nowadays with open source microcode: https://wiki.archlinux.org/title/Microcode. I'm sure windows does it too, or NSA via Windows built in back-doors, only difference is that their firmware is proprietary and full of shady stuff.
With the understanding that "secure" is a relative term, how secure am I using Fedora 33 on an Core 15 chip? (I'll look up the exact chip if it helps.)
Depends on yourself, humans with too much privileges are the biggest threat to any secure system. A clean fresh installation of Fedora 33 should overwrite the CPU microcode before even starting the system and decrypting your drive.
You can check this in the boot menu, fist thing you see after start where it says "Fedora" and "Advanced options for Fedora" or similar. Press E and you should see the whole boot command which will run in sequence. First it loads the microcode, then the kernel and then (if you have full disk encryption enabled) the prompt comes up, or whatever mechanism you use to decrypt on boot.
So relatively secure is the best answer I guess. Just make sure that nobody else ever gets physical access to your device. Make sure to never run shady proprietary software, stick to open source and verify that there are no back doors. That way, chances are very low that someone could ever spy on you or steal your data.
But if you wanna be really secure, you might wanna use Qubes OS. A Linux distro designed with security in mind. Every program runs in it's own vm, and it's not the standard type of vm's, these are completely isolated from each others, giving you full control over everything that runs in your system.
It's not the most convenient solution tho, for instance if you want to plug in a usb device and let a software use it, you need to explicitly allow that in the systems task manager since the usb firmware run in it's own isolated box too. It's a bit of al earning curve, but worth it if you really want perfect security.
It's not the most convenient solution tho, for instance if you want to plug in a usb device and let a software use it, you need to explicitly allow that in the systems task manager since the usb firmware run in it's own isolated box too. It's a bit of al earning curve, but worth it if you really want perfect security.
and I imagine it gives things like OBS all kinds of headaches, lmao.
If you had a 3G modem installed, it can officially communicate back "home" using that modem thanks to the Intel management engine. They can also do it over ethernet or wifi networking cards as well.
Unofficially I don't believe for a second though that they're limited to "3G", and that especially military could have backdoored them to communicate using any other part of the radio spectrum.
Satan's just creating a cheap (very cheap) imitation of God's omnipresence .
https://tv.gab.com/channel/trunews/view/coming-soon-racist-police-drones-60bea008ff67f91022ae627f?ts=1920
https://www.biblewaytoheaven.com/salvation.html
They all source the same parts now though don't they?
Uncle had a C64 he let me play around with back in the day, got an Apple ][e when the school was getting rid of them for $50. (They were cheap as balls and kids could write reports on them, so they hung on well into the 90s).
Sadly, my brothers and I went to live with my bitch of an aunt over some BS I wont get into, and then I got into some trouble and got put into juvie. When I asked about the thing years later, the cunt looks at me like a deer in the headlights and tells me they threw it away years ago.
shame, I had a ton of software that the teachers at the school had gotten rid of when the ][e's went, and between that and the machine, even if i had decided to sell it, I might have been sitting on a small fortune by now. Oh well.
NSA says hello!
His second tweet mentions that these instructions fail unless in debug mode, so this doesn’t impact users.
What does this mean?
Backdoor access to any computer with this chip... Without the computer needing to be on or logged in to Windows.
Check out Christopher Domas' talks for more about these hidden internals, and tools to find and exploit them.
https://www.youtube.com/results?search_query=Christopher+Domas
It's possible to update the microcode firmware via OS. Linux does this by default nowadays with open source microcode: https://wiki.archlinux.org/title/Microcode. I'm sure windows does it too, or NSA via Windows built in back-doors, only difference is that their firmware is proprietary and full of shady stuff.
With the understanding that "secure" is a relative term, how secure am I using Fedora 33 on an Core 15 chip? (I'll look up the exact chip if it helps.)
Depends on yourself, humans with too much privileges are the biggest threat to any secure system. A clean fresh installation of Fedora 33 should overwrite the CPU microcode before even starting the system and decrypting your drive.
You can check this in the boot menu, fist thing you see after start where it says "Fedora" and "Advanced options for Fedora" or similar. Press E and you should see the whole boot command which will run in sequence. First it loads the microcode, then the kernel and then (if you have full disk encryption enabled) the prompt comes up, or whatever mechanism you use to decrypt on boot.
So relatively secure is the best answer I guess. Just make sure that nobody else ever gets physical access to your device. Make sure to never run shady proprietary software, stick to open source and verify that there are no back doors. That way, chances are very low that someone could ever spy on you or steal your data.
But if you wanna be really secure, you might wanna use Qubes OS. A Linux distro designed with security in mind. Every program runs in it's own vm, and it's not the standard type of vm's, these are completely isolated from each others, giving you full control over everything that runs in your system.
It's not the most convenient solution tho, for instance if you want to plug in a usb device and let a software use it, you need to explicitly allow that in the systems task manager since the usb firmware run in it's own isolated box too. It's a bit of al earning curve, but worth it if you really want perfect security.
and I imagine it gives things like OBS all kinds of headaches, lmao.
Thanks for not treating me like an idiot =D