I've seen crypto keys cracked and I have used specifically injected pseudo random patterns, and it does not show up as a flag that can be seen.
Type: Posts; User: Bob; Keyword(s):
I've seen crypto keys cracked and I have used specifically injected pseudo random patterns, and it does not show up as a flag that can be seen.
Certainly we have heard of corrupted firmware in hard drives.. Corrupted hardware though as Paul says which would not go off until some controlled event happens.. And then systems which are not on...
Just read some military aerospace technical journals today, and they are picking up on this current level of "spyware", lending credibility (it's real Apple, Amazon.. etc.. and you cant' get away...
One question
It is called a CLASS ACTION
Against those whom have built in the holes, the deliberate "features" into the CPU's, or the motherboards, or the components.
Isn't about time folks...
Bloomberg reported today *9 october 2018 that the security firm that discovered the "chip" in the bus on the motherboard had an apparent COMPONENT LEVEL hack, this time with an embedded spyware...
[..]
therefore I find it not at all surprising that automated checking of the final manufactured board, to see that it matches the original design, would be an area of extended University research....
The A2 attack described in post 17 above shows the impossibility to use either X-Ray or optical comparison of proper images of boards and layers.
Who gave them the idea? Chinese espionage and...
On Hack-a-day there was an article, that a device, a smart device such as a fax machine connected to one's in-home network, could be sent a PICTURE with embedded data code hidden within.. If you...
WIRED published an article which showed how a hidden sabotaged function in a computer or electronic's CHIP could be designed. (These chips can contain billions of transistors, or circuits and are...
I suppose this begs us to question, exactly what IS in a component, a "chip" or part that the supply chain receives from let's say China, or Malaysia, or the Philippines.. Remember that airplane...
Looks like Facebook and Apple finally confirm, yes they were targets
from Mashable - https://mashable.com/article/chinese-malware-server-attack-bloomberg-facebook-apple/#hsR7XtrouGqq
Reports of major tech giants using the SuperMicro servers -
IBM has been known as a big customer of Supermicro, which supplied servers for its cloud business, formerly known as SoftLayer.
...
Here is an article on Ars-technica (2017) about APPLE getting rid of SuperMicro servers -...
This is an extract from the original Bloomberg article: see https://www.bloomberg.com/news/articles/2018-10-09/new-evidence-of-hacked-supermicro-hardware-found-in-u-s-telecom "Chinese hardware...
Here is how AWS Amazon rebuffed Bloomberg's article - fake news or what?
Bloomberg's original article is here:
...
So maybe more of the users of the product need to say "it never happened !" (Schultz, I know nothing, nooooothing )
from:
...
This originates out of Bloomberg and picked up by the news services. Those "hacked" (hardware violated by physical spyware installed in China on motherboards) deny the claim.. who's to believe?
...