- use a nice AMD FX-8350. No backdoor. - what the hell is NSA going to do with umpty-gazillion MB of encrypted traffic they can't read?
Aaron Brown
All AMD hardware post 2013 is compromised fam
David Walker
Dumbass, the FX chips came out in 2011.
Nathan Cox
Two reasons:
1. No real world example of this staed scenario has been documented. 2. All threads created with with the "[x] is [y] prove me wrong XD" narrative should be pruned along with the faggots who create them.
Jordan Foster
...
Benjamin Stewart
I'm dumb so pls explain: if so many processors and other hardware pieces allegedly have backdoors wouldn't a simple scan of the network traffic prove once for all they are actually pinging home?
Jack Hernandez
Only the family 16h and after. There was still CPUs from previous families launched after 2013. In fact I think none of the desktop CPUs until Ryzen were fam16 or greater.
Michael Sanchez
Intel me is a bad thing but just use tor on an ARM or MIPS board. use a usb NIC if your worried about ME's out of band access to your ethernet. Compile tor with libressl These defeatist posts that offer nothing but "stop using x, x is bad!" are literal 3 letter shills or retards.
David Powell
What hardware are you running the scan on? :^)
Seriously though, the backdoors probably aren't used very often, but they could be. They WILL eventually be exploited, too. Imagine if intel had their own door into your house.
All x86 hardware post 1993 is compromised. en.wikipedia.org/wiki/System_Management_Mode
Benjamin Perry
...
Jacob Thomas
Only a retard like you would think that. What they probably think is that Tor encryption is a great security measure, not that Tor is making them anonymous in those cases. Why is it that the people who howl the loudest about imaginary problems with Tor are the people who obviously know the least about it?
Matthew Myers
How exactly is having your personal data transmitted directly through CIA controlled tor nodes secure?
Ryan Harris
t. tinfoil moron
Brandon Murphy
Unless you use AES instructions like a retard, it's prohibitively expensive to recognize encryption on a CPU. What remains is a possibility that the chip checks for certain actions in operating systems (say Windows' crypto API calls), but that has to be tailored to the OS and is more likely to affect Windows than all the different Linux versions.
That said, fuck ME and PSP, I'll stay on old AMD CPUs forever if I have to.
Liam Rivera
The TOR nodes run on intel CPUs, at least most of them do. Are you that thick you dont understand how that would compromise them?
Parker Rogers
But thats fucking bullshit. Most of the nodes are run by guys who want to mix their latent traffic with Tor traffic.
t. Tor exit node server owner
Robert Ramirez
For the low-end desktop chips, you allegedly have to run some special software on localhost to enable the remote admin functionality. But it's entirely possible the Intel ME microcontroller also listens constantly for a "magic packet" on the LAN or WLAN, which causes it to engage the same RAT in a true backdoor style. It might even be possible to deliver a magic packet over web, but that could leave more evidence behind in various logs. Whereas a useless ethernet frame will normally just get ignored rather than audited.
Christopher Collins
t. cia nigger
Easton Bell
t. cia nigger
Samuel Perez
...
Samuel Roberts
Can I turn this off somehow with libreboot?
Brayden Bennett
...
Connor Richardson
Build your own CPU.
Jaxson Gutierrez
You're probably the cia nigger here. Agent Fud has been trying to shill everyone into not using Tor since forever. Sounds a lot like you, doesn't it?
Levi Perry
based, how bad is it from a legal point of view?
Ethan Reed
As far as i can tell Libreboot limits it significantly[1], and has full control over what gets put into SMM. It's just regular x86 code, unlike Intel ME which are mandatory encrypted/obfuscated blobs. Unfortunately SMM is used to realize key features like power management so you can't really turn it off completely, although it's certainly theoretically possible.
[1]Based on this quote: "On x86 devices, non-free boot firmwares have a tendency to put a lot of code to run in SMM. In contrast Coreboot keep it to a minimum." from coreboot.org/Security#Auditable_code