←back to thread

276 points chei0aiV | 1 comments | | HN request time: 0.208s | source
Show context
jbob2000 ◴[] No.10458486[source]
So I read the blog post and skimmed the PDF and I'm left with some questions. IF these security issues have been present for 10 years, but there hasn't been any widespread malicious action on them, are they really issues?

To create an analogy, my car doesn't have bullet proof glass, someone could easily shoot it up and i'd be dead. But nobody really goes around shooting up cars, so is it an issue?

replies(6): >>10458619 #>>10458631 #>>10458642 #>>10458718 #>>10458809 #>>10460889 #
1. rasz_pl ◴[] No.10460889[source]
25 years, SMM was born on 386SL in 1990

but it gets worse, every processor from PPro (1995) on to sandy bridge has a gaping security hole reported (conveniently only AFTER Intel patched it 2 generations ago) by a guy working for Battelle Memorial Institute, known CIA front and black budget sink

https://www.blackhat.com/docs/us-15/materials/us-15-Domas-Th...

surprisingly good writeup: http://www.theregister.co.uk/2015/08/11/memory_hole_roots_in...

list of CIA fronts: http://www.jar2.com/2/Intel/CIA/CIA%20Fronts.htm battelle is on it