• Competitor rules

    Please remember that any mention of competitors, hinting at competitors or offering to provide details of competitors will result in an account suspension. The full rules can be found under the 'Terms and Rules' link in the bottom right corner of your screen. Just don't mention competitors in any way, shape or form and you'll be OK.

Intel x86s Hide Another CPU That Can Take Over Your Machine -- You Can't Audit it

Been tinfoil hat types fretting about this for at least a couple years, hasn't there?

I wouldn't call them tinfoil hat types. This is a serious threat to the safety of a system. It basically means that any code running on the machine can 100% of the time bypass the running operating system such as Windows or Linux.

Imagine if some put a key logger there. You'd never be able to remove it and the only way to fix your computer was to buy a whole new CPU from Intel. Nothing you did in the operating system would reveal the key loggers process to you. It could just read arbitrary data from the running operating system whilst being 100% undetectable.

Most security researchers find that sort of thing rather worrying and it is certainly in the realms of being possible.
 
Back
Top Bottom