My pet rock Gordon asserts that every networked device has
a backdoor. and the Therefore, anything viewable in clear
on that device is insecure quality of message encryption is moot.
followups trimmed to: comp.misc
In comp.misc Sn!pe <snipeco.2@gmail.com> wrote:
My pet rock Gordon asserts that every networked device has
a backdoor. Therefore, anything viewable in clear on that device
is insecure and the quality of message encryption is moot.
Well I would say Gordon could be correct. I say that due to
Intel ME and probably AMD SE:
<https://en.wikipedia.org/wiki/Intel_Management_Engine>
My pet rock Gordon asserts that every networked device has a backdoor. Therefore, anything viewable in clear on that device is insecure and the quality of message encryption is moot.
My pet rock Gordon asserts that every networked device has a backdoor.
Therefore, anything viewable in clear on that device is insecure and the quality of message encryption is moot.
Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor.meet me half way
Therefore, anything viewable in clear on that device is insecure and the
quality of message encryption is moot.
% <pursent100@gmail.com> wrote at 15:18 this Friday (GMT):
Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor.meet me half way
Therefore, anything viewable in clear on that device is insecure and the >>> quality of message encryption is moot.
Where would that be?
candycanearter07 wrote:
% <pursent100@gmail.com> wrote at 15:18 this Friday (GMT):the north arctic
Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor. >>>> Therefore, anything viewable in clear on that device is insecure andmeet me half way
the
quality of message encryption is moot.
Where would that be?
Well I would say Gordon could be correct. I say that due to
Intel ME and probably AMD SE:
snipeco.2@gmail.com (Sn!pe) wrote:
My pet rock Gordon asserts that every networked device has a backdoor.
Make computing safe again!
<https://www.spielezar.ch/products/34316-genzo_theme_large_default/the-army-painter-precision-side-cutter.webp>
Therefore, anything viewable in clear on that device is insecure and the quality of message encryption is moot.
Nobody wants the data cattle to have access to strong encryption.
On Fri, 11 Oct 2024 14:52:47 -0000 (UTC), John McCue wrote:
Well I would say Gordon could be correct. I say that due to
Intel ME and probably AMD SE:
The Intel ME can be disabled in the motherboard BIOS. Whenever
I build a new machine it is one of the first things that I
disable.
Also, the Linux kernel can be configured and built without
the MEI driver by disabling CONFIG_INTEL_MEI, which is located
here:
drivers/misc/mei
ISTM that a secure payload would need to be encrypted on a stand-alone machine, air-gapped and never to be connected online.
Farley Flud <ff@linux.rocks> wrote:
The Intel ME can be disabled in the motherboard BIOS. Whenever
I build a new machine it is one of the first things that I
disable.
No. The interface that makes the ME visible to the operating system
can be disabled, but the ME is still down there doing whatever
undocumented things it does. If it wasn't, the processor would never
be able to load the microcode in the first place.
My pet rock Gordon asserts that every networked device has a backdoor. Therefore, anything viewable in clear on that device is insecure and the quality of message encryption is moot.
On 11-Oct-24 10:17 pm, Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor.
Therefore, anything viewable in clear on that device is insecure and the
quality of message encryption is moot.
An initial question is what exactly is meant by "backdoor". Any
networked device that is capable of remote update by the vendor can presumably be updated by the vendor to do anything that any device on
your network can do. But this does not imply that anyone else can do
that. Of course it does mean that you security depends on the security
of the vendor, which is an unknown quantity. This is partly why the few remotely updatable devices that I do own are fire-walled off from the
rest of my internal network.
Few networked devices accept incoming connections, for the simple reason that they're unlikely to get past a gateway router. Most work by making outgoing connections to the vendor's server. The better implementations require an authenticated server certificate, which makes impersonation
of the vendor pretty much impossible. Without a certificate the
intending intruder may engage in something like a DNS cache poisoning attack, but they have become more difficult over the years.
If one is to worry about back-doors, the main vulnerability is the
router itself, and this has indeed been a problem in the past,
especially where the ISP has the ability to update firmware or change settings, because now one is dependent on the security of the ISP, which
is not always been up to the task.
Commercially supplied routers have a bad record of vulnerabilities. I
use a small single board computer as a gateway instead.
Sylvia.
Sylvia Else wrote:
On 11-Oct-24 10:17 pm, Sn!pe wrote:i have nothing to hide so i don't do anything
My pet rock Gordon asserts that every networked device has a backdoor.
Therefore, anything viewable in clear on that device is insecure and the >>> quality of message encryption is moot.
An initial question is what exactly is meant by "backdoor". Any
networked device that is capable of remote update by the vendor can
presumably be updated by the vendor to do anything that any device on
your network can do. But this does not imply that anyone else can do
that. Of course it does mean that you security depends on the security
of the vendor, which is an unknown quantity. This is partly why the
few remotely updatable devices that I do own are fire-walled off from
the rest of my internal network.
Few networked devices accept incoming connections, for the simple
reason that they're unlikely to get past a gateway router. Most work
by making outgoing connections to the vendor's server. The better
implementations require an authenticated server certificate, which
makes impersonation of the vendor pretty much impossible. Without a
certificate the intending intruder may engage in something like a DNS
cache poisoning attack, but they have become more difficult over the
years.
If one is to worry about back-doors, the main vulnerability is the
router itself, and this has indeed been a problem in the past,
especially where the ISP has the ability to update firmware or change
settings, because now one is dependent on the security of the ISP,
which is not always been up to the task.
Commercially supplied routers have a bad record of vulnerabilities. I
use a small single board computer as a gateway instead.
Sylvia.
My pet rock Gordon asserts that every networked device has a backdoor.
snipeco.2@gmail.com (Sn!pe) wrote:
/!\ The following should be read with a mix of panic and a smile; you
decide, what to apply to which parts.
ISTM that a secure payload would need to be encrypted on a stand-alone machine, air-gapped and never to be connected online.
There are many ways even air-gapped systems can or do leak data, that
may leak the keys or partial information about them.
IMO every system that exists on the same side of the singularities as we
do *is* connected with the rest. It just may be harder to get the data
you want.
We had leaking CRTs which could be read over a distance, AM leaks using rhythms of loops while computing, blinking drive LEDs, RPM modulated
fans, ultrasonic connections between laptops in exams, and additionally
we are in the
__ __ ___ _ _ _____ __ ___ _ _ _
| \/ |_ _| \| |_ _\ \/ / |_ _|_ _ __(_)__| |___| |
| |\/| || || .` || | > < | || ' \(_-< / _` / -_)_|
|_| |_|___|_|\_|___/_/\_\ |___|_||_/__/_\__,_\___(_)
era and I definitely will not bet that ARM and RISCV chips or even FPGAs don't come "pre-infected" in a comparable way. So who knows which
Gremlins in other chips are able to play e.g. modem over power-line and whatnot.
So better assume that every system that is not made exclusively from
logic gates[0] you've baked yourself in your kitchen already comes
infected with spy hard- and software. And thinking about this shouldn't
stop without a look at the power supply[1]. Some leaks still may exist
no matter what you use to build the gates, but at least the foreign
gremlins would stay outside.
TL;DR:
__ __ _ _ _ _ _ _
\ \ / /__( )_ _ ___ __| |___ ___ _ __ ___ __| | | | |
\ \/\/ / -_)/| '_/ -_) / _` / _ \/ _ \ ' \/ -_) _` |_|_|_|
\_/\_/\___| |_| \___| \__,_\___/\___/_|_|_\___\__,_(_|_|_)
____________
[0]: Jeri Makes Integrated Circuits <https://hackaday.com/2010/03/10/jeri-makes-integrated-circuits/#more-2229
Transistor Fabrication: So Simple A Child Can Do It--
<https://hackaday.com/2010/05/13/transistor-fabrication-so-simple-a-c
hild-can-do-it/>
LLTP - Light Logic Transistorless Processor
<https://hackaday.io/project/172413-lltp-light-logic-transistorless-p
rocessor>
Mechanical Logic Gates With Amplification
<https://hackaday.com/2024/09/20/mechanical-logic-gates-with-amplific
ation/>
[1]: Charging An Electric Supercar With Lemons, Kids, And The Sun <https://hackaday.com/2018/06/29/charging-an-electric-supercar-with-lemons -kids-and-the-sun/>
On Fri, 11 Oct 2024 15:17:35 +0100, Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor.
Is Gordon a networked device? How did it communicate that message to you?
% wrote:
candycanearter07 wrote:
% <pursent100@gmail.com> wrote at 15:18 this Friday (GMT):the north arctic
Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor. >>>>> Therefore, anything viewable in clear on that device is insecure and >>>>> themeet me half way
quality of message encryption is moot.
Where would that be?
no , the north atlantic , sorry
Lawrence D'Oliveiro <ldo@nz.invalid> wrote at 06:18 this Monday (GMT):
On Fri, 11 Oct 2024 15:17:35 +0100, Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor.
Is Gordon a networked device? How did it communicate that message to you?
A networked rock?
candycanearter07 <candycanearter07@candycanearter07.nomail.afraid>
wrote:
Lawrence D'Oliveiro <ldo@nz.invalid> wrote at 06:18 this Monday (GMT):
On Fri, 11 Oct 2024 15:17:35 +0100, Sn!pe wrote:A networked rock?
My pet rock Gordon asserts that every networked device has a backdoor.
Is Gordon a networked device? How did it communicate that message to you? >>
Gordon is a primary node on the Extranet but he and I have a direct P2P >telepathic link for a shorter ping.
snipeco.2@gmail.com (Sn!pe) wrote:
candycanearter07 <candycanearter07@candycanearter07.nomail.afraid>
wrote:
Lawrence D'Oliveiro <ldo@nz.invalid> wrote at 06:18 this Monday (GMT):
On Fri, 11 Oct 2024 15:17:35 +0100, Sn!pe wrote:A networked rock?
My pet rock Gordon asserts that every networked device has a backdoor. >>>>Is Gordon a networked device? How did it communicate that message to you? >>>
Gordon is a primary node on the Extranet but he and I have a direct P2P
telepathic link for a shorter ping.
So, you hated on me for liking trans women, but you're talking about a
rock as if it's alive. OK.
snipeco.2@gmail.com (Sn!pe) wrote:
candycanearter07 <candycanearter07@candycanearter07.nomail.afraid>
wrote:
Lawrence D'Oliveiro <ldo@nz.invalid> wrote at 06:18 this Monday (GMT):
On Fri, 11 Oct 2024 15:17:35 +0100, Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor. >> >Is Gordon a networked device? How did it communicate that message to you?
A networked rock?
Gordon is a primary node on the Extranet but he and I have a direct P2P >telepathic link for a shorter ping.
So, you hated on me for liking trans women, but you're talking about a
rock as if it's alive. OK.
On 14-Oct-24 11:35 am, % wrote:
Sylvia Else wrote:
On 11-Oct-24 10:17 pm, Sn!pe wrote:i have nothing to hide so i don't do anything
My pet rock Gordon asserts that every networked device has a backdoor. >>>> Therefore, anything viewable in clear on that device is insecure and
the
quality of message encryption is moot.
An initial question is what exactly is meant by "backdoor". Any
networked device that is capable of remote update by the vendor can
presumably be updated by the vendor to do anything that any device on
your network can do. But this does not imply that anyone else can do
that. Of course it does mean that you security depends on the
security of the vendor, which is an unknown quantity. This is partly
why the few remotely updatable devices that I do own are fire-walled
off from the rest of my internal network.
Few networked devices accept incoming connections, for the simple
reason that they're unlikely to get past a gateway router. Most work
by making outgoing connections to the vendor's server. The better
implementations require an authenticated server certificate, which
makes impersonation of the vendor pretty much impossible. Without a
certificate the intending intruder may engage in something like a DNS
cache poisoning attack, but they have become more difficult over the
years.
If one is to worry about back-doors, the main vulnerability is the
router itself, and this has indeed been a problem in the past,
especially where the ISP has the ability to update firmware or change
settings, because now one is dependent on the security of the ISP,
which is not always been up to the task.
Commercially supplied routers have a bad record of vulnerabilities. I
use a small single board computer as a gateway instead.
Sylvia.
Not even information that could be used in identity theft?
Sylvia.
candycanearter07 <candycanearter07@candycanearter07.nomail.afraid>
wrote:
Lawrence D'Oliveiro <ldo@nz.invalid> wrote at 06:18 this Monday (GMT):
On Fri, 11 Oct 2024 15:17:35 +0100, Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a
backdoor.
Is Gordon a networked device? How did it communicate that message to
you?
A networked rock?
Gordon is a primary node on the Extranet but he and I have a direct P2P telepathic link for a shorter ping.
User-Agent: MacSOUP/2.8.6b1 (ed136d9b90) (Mac OS 10.13.6)
Joel <joelcrump@gmail.com> wrote:
snipeco.2@gmail.com (Sn!pe) wrote:
candycanearter07 <candycanearter07@candycanearter07.nomail.afraid>
wrote:
Lawrence D'Oliveiro <ldo@nz.invalid> wrote at 06:18 this Monday (GMT):
On Fri, 11 Oct 2024 15:17:35 +0100, Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a backdoor. >> >> >Is Gordon a networked device? How did it communicate that message to you?
A networked rock?
Gordon is a primary node on the Extranet but he and I have a direct P2P
telepathic link for a shorter ping.
So, you hated on me for liking trans women, but you're talking about a
rock as if it's alive. OK.
I don't know you well enough to hate you but I will say this:
Gordon talks more sense than you do. [fu2: adn]
On Mon, 14 Oct 2024 21:21:41 +0100, Sn!pe wrote:
candycanearter07 <candycanearter07@candycanearter07.nomail.afraid>
wrote:
Lawrence D'Oliveiro <ldo@nz.invalid> wrote at 06:18 this Monday (GMT):
On Fri, 11 Oct 2024 15:17:35 +0100, Sn!pe wrote:
My pet rock Gordon asserts that every networked device has a
backdoor.
Is Gordon a networked device? How did it communicate that message to
you?
A networked rock?
Gordon is a primary node on the Extranet but he and I have
a direct P2P telepathic link for a shorter ping.
So he is a networked device. And according to his statement, every
networked device has a backdoor. Therefore Gordon has a backdoor.
Is Gordon still to be trusted?
OK, Mac user.
OK, Mac user.
<giggle> ?:o)
Of course, he's as solid as a rock; not that we worry about lack
of privacy. As everybody should know, privacy is utterly dead
and security is naught but an illusion.
Sn!pe <snipeco.1@gmail.com> wrote:
Of course, he's as solid as a rock; not that we worry about lack
of privacy. As everybody should know, privacy is utterly dead
and security is naught but an illusion.
And a rock feels no pain. And an island never cries.
--scott
Scott Dorsey <kludge@panix.com> wrote:
Sn!pe <snipeco.1@gmail.com> wrote:
Of course, he's as solid as a rock; not that we worry about lack
of privacy. As everybody should know, privacy is utterly dead
and security is naught but an illusion.
And a rock feels no pain. And an island never cries.
--scott
True, that, although Gordon is quite empathetic. To expect
sympathy is going a bit far though, he's seen it all before.
Anyway, he is my rock. ≈:o)
Sn!pe <snipeco.2@gmail.com> wrote at 01:03 this Wednesday (GMT):
Scott Dorsey <kludge@panix.com> wrote:
Sn!pe <snipeco.1@gmail.com> wrote:
Of course, he's as solid as a rock; not that we worry about lack
of privacy. As everybody should know, privacy is utterly dead
and security is naught but an illusion.
And a rock feels no pain. And an island never cries.
--scott
True, that, although Gordon is quite empathetic. To expect
sympathy is going a bit far though, he's seen it all before.
Anyway, he is my rock. ≈:o)
Pet rocks are always cute :)
Sysop: | DaiTengu |
---|---|
Location: | Appleton, WI |
Users: | 991 |
Nodes: | 10 (0 / 10) |
Uptime: | 81:23:03 |
Calls: | 12,949 |
Calls today: | 3 |
Files: | 186,574 |
Messages: | 3,264,666 |