PDA

View Full Version : Intel computers hide another CPU that can take over your machine



Builder
16th June 2016, 11:58
"Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine."

http://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html

Daozen
16th June 2016, 12:37
Worth a thread on it's own. I've been doing my own reading about Google today, another military industrial corporation masquerading as a cute company.....

"Intel", hiding in plain view. And what is Google's parent company now called? Alphabet.

Carmody
16th June 2016, 14:07
I mentioned, on this forum, at various times and places.... that this was being done with telecommunications hardware, to my direct communicated knowledge, since approx 1993.

Ie, that I've known of this secondary control set and feature that comes in on normal (inescapable) signal pathways, for 23 years.

Consider the takeover story of Cisco, as they are now -the- internet backbone company.

The origins go all the way back to the Atlas rocket program and how the scientists involved (the first hackers) created the basis for the arpanet. (another story I received first hand)

Thus, as the logic dominoes fall, the idea of Chinese chipsets (or whatever) that might do unwanted things, just got very very real.



Esoterically, it's a case of as above, so below: You...are a hybrid... a foreign program inserted as an overlay on a biological. In a holographic seeming temporally inclined dimensional 'space'.

The biological has override programs. Fear, love, hate, pain, reflex, complex processing systems like the gut, etc...

We call some leveraged activations of some of those override features that are always active and running in the biological...we call them... 'false flags'.

ThePythonicCow
16th June 2016, 14:53
I mentioned, on this forum, at various times and places.... that this was being done with telecommunications hardware, to my direct communicated knowledge, since approx 1993.
Similarly I've known of the parallel management channels in Intel processors, visible in such features as Wake-On LAN for Intel® (http://www.intel.com/content/www/us/en/support/boards-and-kits/desktop-boards/000006002.html), for at least a couple of decades, and with more advanced system management facilities in Intel's server line of CPU's (Xeon and Itanium).

That's an interesting analogy you make between the hybrid layering of humanity, and these parallel control channels in networking and processing hardware. Thanks.

ThePythonicCow
16th June 2016, 16:07
Similarly I've known of the parallel management channels in Intel processors, visible in such features as Wake-On LAN for Intel® (http://www.intel.com/content/www/us/en/support/boards-and-kits/desktop-boards/000006002.html), for at least a couple of decades, and with more advanced system management facilities in Intel's server line of CPU's (Xeon and Itanium).
And, of course, there's another example of a covert layered control channel hiding in plain sight - there is increasing use of virtual machines, presently in the server world, and tentatively in the desktop personal computer world (such as with Qubes (https://www.qubes-os.org/) and Wine (https://www.winehq.org/)).

In a virtual machine, the "computer" you think you are using is running on top of another layer of software, that has complete control over everything coming in and out of the virtualized computer. My Linode.com (http://linode.com) "box" that I use to support several websites, such as projectavalonstatus.net (http://projectavalonstatus.net/), is such a virtual box, allowing me to stop, and start, and reconfigure the "server" (virtualized computer running inside an actual server somewhere inside Linode.com) at will, from my North Texas trailer, with no physical contact or involvement by real human Linode employees.

In short, most any sufficiently advanced technology is capable of such magic layering ... indeed ... that layering of structure is ubiquitous in our universe. In the grand scheme of things, the layers are either self-organizing and forming, or created by some higher power. Then we humans, and apparently other intelligent beings such as might have crafted us humans, construct more such layers, of more mundane natures.

Such layering creates opportunities for out-of-channel information sharing and control, invisible to those confined to some other layer.

ThePythonicCow
16th June 2016, 16:36
Such layering creates opportunities for out-of-channel information sharing and control, invisible to those confined to some other layer.
Yet another example: the presently infamous "spooky action at a distance" discussed in quantum mechanics is likely, in my view, just another example of something that likely could be described easily using the layer of physical ordering once known as the "aether", but which seems magical when we insist on explaining it using only some other layer, such as that of matter and mathematically abstracted fields such as electro-magnetism, gravity, strong and weak forces.

ThePythonicCow
16th June 2016, 16:41
I have long thought that the key to the organization of computer software and hardware was the organization of the human individuals, teams, businesses, etc that created that software and hardware.

Carmody's point, before I wander too far off topic, seems to me to be that this same rule of thumb applies to the organization of the "wetware" known as humans. Our organization, both as individual beings and as civilizations, likely reflects the ordering and organization of higher entities that have played critical defining roles in our creation and evolution.

WhiteLove
16th June 2016, 16:43
This article is jaw dropping. This whole design appears to be built around remotely executing any process on any target Intel X86 based system for any duty anywhere at any time with maximum access to the target, limiting the access to these processes and encrypting the activities so hard that it is impossible do decode the process and the communication.

This really appears to be some kind of globally controlled military control mechanism. This is very disturbing in many ways...

Carmody
16th June 2016, 16:57
This article is jaw dropping. This whole design appears to be built around remotely executing any process on any target Intel X86 based system for any duty anywhere at any time with maximum access to the target, limiting the access to these processes and encrypting the activities so hard that it is impossible do decode the process and the communication.

This really appears to be some kind of globally controlled military control mechanism. This is very disturbing in many ways...

The majority of all mainframe and individual telecommunications hardware from the big suppliers, in all of the western world... was built this way since approximately 1995. they did not have the data handling capacity at the time, so the usage was selective. Then. Not now. Now we have all of it recorded and kept. All.

Computers are late to the game as they are the newest kids on the block. But they have moved up fast, to surpass the telecommunications systems of the recent past.

http://www.dhra.mil/perserec/osg/images/cartoons/comint.jpg

The attack is against encrypted software, or encrypted data, as the encryption, if well done, can have the data being passed through any system ---without being in any sort of danger of being decoded or understood.

ThePythonicCow
16th June 2016, 17:00
This article is jaw dropping. This whole design appears to be built around remotely executing any process on any target Intel X86 based system for any duty anywhere at any time with maximum access to the target, limiting the access to these processes and encrypting the activities so hard that it is impossible do decode the process and the communication.
It (this layered structure) made perfectly good sense to me at the time, when I was involved in designing and developing systems for use by large corporate and government customers. It was, and remains, important to those customers to be able to manage their computation, storage, communication, sensory and robotic resources, in a separate control layer, as resources per se, distinct from and with zero impact on the specific programs running within them.

Another example might be suggestive. A large trucking, rail and shipping firm will want to manage its trucks, railcars, containers, and ships, keeping track of and controlling what's where, doing what, independently of, but controlling and monitoriing, what individual truck drivers, rail engineers and ship crew might be doing.

The existence of such layered control and monitoring systems is not ipso facto evil ... but such existence can be evidence of an underlying control structure over human civilization that may well be, in human terms, quite evil.

Carmody
16th June 2016, 17:06
This article is jaw dropping. This whole design appears to be built around remotely executing any process on any target Intel X86 based system for any duty anywhere at any time with maximum access to the target, limiting the access to these processes and encrypting the activities so hard that it is impossible do decode the process and the communication.
It (this layered structure) made perfectly good sense to me at the time, when I was involved in designing and developing systems for use by large corporate and government customers. It was, and remains, important to those customers to be able to manage their computation, storage, communication, sensory and robotic resources, in a separate control layer, as resources per se, distinct from and with zero unintended impact on the specific programs running within them.

Another example might be suggestive. A large trucking, rail and shipping firm will want to manage its trucks, railcars, containers, and ships, keeping track of and controlling what's where, doing what, independently of, but controlling and monitoriing, what individual truck drivers, rail engineers and ship crew might be doing.

The existence of such layered control and monitoring systems is not ipso facto evil ... but such existence can be evidence of an underlying control structure over human civilization that may well be, in human terms, quite evil.

You might even say that the systems are useless or without a good half or more of their potential function available, if they did not have it.

In the case of the average person's concern, a backdoor is potential for abuse and cannot be tolerated, like a place on the body where a virus can enter and wreak havoc.

Trust has to be earned, and the powers at large are so far down the untrustable and devious/malicious end of the pier... that it seems they'll never get to neutral in the next thousand years, If at all.

Builder
16th June 2016, 17:13
There is also a secondary system in every phone:
http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone

ThePythonicCow
16th June 2016, 17:17
In the case of the average person's concern, a backdoor is potential for abuse and cannot be tolerated, like a place on the body where a virus can enter and wreak havoc.

Trust has to be earned, and the powers at large are so far down the untrustable and devious/malicious end of the pier... that it seems they'll never get to neutral in the next thousand years, If at all.

Trust, and understanding/awareness.

What we do not understand is often threatening ... strange things go bump in the darkness of our confusion. Sometimes the resulting fear is entirely appropriate, sometimes not.

When we do understand, we can distinguish the sound of our family cat jumping up on the dresser to take a nap on a soft pile of clothes, from the sound of a burglar or "man-in-black" abductor. Our response can be more refined and appropriate, and our fears less vague, ubiquitous and often misplaced.

ThePythonicCow
16th June 2016, 17:23
There is also a secondary system in every phone:
http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone

Nice one. Another instance of such a secondary system is being created as we write, in programmable home routers: MIPS VM tech lets routers stay open despite new FCC rules (http://hackerboards.com/mips-vm-tech-lets-routers-stay-open-despite-new-fcc-rules/).

muxfolder
16th June 2016, 18:23
I'm sure this same technology is in AMD-processors as well although it's not mentioned here. But it's for our benefit of course, or at least that's what they're trying to tell us.

conk
16th June 2016, 18:42
Carmody says "Now we have all of it recorded and kept. All." What a monumental chore, cataloging and retrieving such an Everest of data!

Hervé
16th June 2016, 19:23
^^^ Google and its fame search engine is their friend...

Carmody
16th June 2016, 20:00
I'm sure this same technology is in AMD-processors as well although it's not mentioned here. But it's for our benefit of course, or at least that's what they're trying to tell us.

I was just thinking about going AMD for that very reason. to get away from Intel. but....I'd have to research that first.

Yetti
16th June 2016, 21:19
That's why I like person to person communication, internet is not safe anymore !

ThePythonicCow
17th June 2016, 00:16
I was just thinking about going AMD for that very reason. to get away from Intel. but....I'd have to research that first.
Let us know if you figure anything out.

guayabal
17th June 2016, 00:31
AMD processors have a similar "feature" (AMD Platform Security Processor). From http://security.stackexchange.com/questions/80634/how-to-minimize-the-risk-posed-by-intel-amt-mes-ring-3-exploits:
"
...AMD has their PSP, which is even worse. The implementation is quite different, but it has far less security than the Intel ME and is easier to hijack. Avoiding the x86 architecture is better advice...
"

apokalypse
17th June 2016, 03:40
the more i think about it the more i find it true that all the hardware contain backdoor, just weird to me that things like smart phones all use same chip/part from once source and the architecture are the same..design of it is too look different but every year they release same crap with CPU based technologies. 90% of hardware parts are invented by government which they are funded.

Hervé
22nd June 2016, 13:27
Chinese chip...

China creates world’s fastest computer without relying on US hardware for first time (https://www.rt.com/news/347620-china-supercomputer-sunway-taihulight/)

Published time: 21 Jun, 2016 13:12
Get short URL (http://on.rt.com/7g84)


https://img.rt.com/files/2016.06/original/57693b9dc4618884708b456a.jpg
© Jack Dongarra, Report on the Sunway TaihuLight System, June 2016


A Chinese supercomputer has been named the world's fastest computer for the seventh year in a row – but unlike previous winners, this year's champion uses only Chinese-designed processors, representing a decline of US dominance in the field.

The new titleholder, the Sunway TaihuLight at the National Supercomputing Center in Wuxi, was developed by China's National Research Center of Parallel Computer Engineering & Technology.


The supercomputer uses Chinese-developed ShenWei processors, “ending any remaining speculation that China would have to rely on Western technology to compete effectively in the upper echelons of supercomputing," said a statement by the TOP500 project ranking the world's fastest supercomputers.

It is capable of 93 petaflops, or quadrillion calculations per second, according to TOP500. It was designed for use in engineering and research, including in the fields of climate, weather, life sciences, advanced manufacturing, and data analytics.

The TaihuLight will be introduced at the International Supercomputing Conference in Frankfurt, Germany, on Tuesday.

"As the first No. 1 system of China that is completely based on homegrown processors, the Sunway TaihuLight system demonstrates the significant progress that China has made in the domain of designing and manufacturing large-scale computation systems," Guangwen Yang, director of the Wuxi center, was quoted as saying in the TOP500 statement.

Other countries with computers in the Top 10 were Japan, Switzerland, Germany, and Saudi Arabia.

In addition to beating out US computers, China also surpassed the US for the first time as the country with the most supercomputers in the top 500. China had 167 systems and the US had 165. Japan took third place with 29 systems.

China's developments serve as evidence of dwindling US dominance in the field, with TOP500 organizers saying: “Considering that just 10 years ago, China claimed a mere 28 systems on the list, with none ranked in the top 30, the nation has come further and faster than any other country in the history of supercomputing.”

Defined as a computer that performs at or near the highest operational rate for computers, supercomputers are one of a series of technologies being used by China's ruling Communist Party for development. The technologies have received huge financial support in the country.


Related:
Scientists successfully test ‘biological supercomputer’ performing complex tasks (https://www.rt.com/news/333912-biocomputers-perform-complex-calculations/)