Remote CPU access
For this web site, this is old news, 2011 news. That is when this web site first reported uncontrollable remote access, and now the "tech experts" are catching up . . . . .
The original report was titled "Is Intel's Sandy Bridge on a road to nowhere". It was one of my early reports about Intel processors having a 3g back door that can be used to kill them and fake an EMP attack. But I did not see the obvious at that time - that any 3g connection will allow a full on rape of the entire system.
Now, more than half a decade later, others are finally catching up!
Ray sent:
extremetech dot com/computing/248919-major-intel-security-flaw-serious-first-thought
"Major Intel Security Flaw Is More Serious Than First Thought"
By Joel Hruska on May 8, 2017
"Last week, Intel disclosed a serious security flaw that could be used to gain remote access to business computers without the OS ever knowing such access had occurred. Now we know the situation is even worse than we thought."
Jim, your reservations about Intel chips are coming to light...
Ray" My response: I am going to say it again as I said it then: There is no security whatsoever with Intel chips. They recently admitted to this in the professional chips, but the back door is in ALL OF THEM since Sandy Bridge. Everything on your computer can be assumed immediately accessible to the government (and whoever else is privileged) via the cell phone network. They just dial into your computer through a connection you don't know about and take whatever they want.
No one else out there will admit this yet - that all Intel based computers, even at the consumer level, can be accessed at will by the government and there is no possible way to secure them.
justpaste.it
82.221.129.208