Lol what are you even talking about? No edits have been to any of my comments. You’re just insane, friend.
Lol what are you even talking about? No edits have been to any of my comments. You’re just insane, friend.
You keep sending these, and they have nothing to do with what you’re claiming at all. Just stop lol
Again-and maybe you don’t know what a backdoor is exactly-this is not from the manufacturer as you’ve claimed. This is Dropoutjeep, a long-patched vulnerability that was exploited to install a backdoor.
Your original comment is about manufacturers installing backdoors, and this is not that. This is also decade old news.
No goalpost has been been moved here, you haven’t even left the endzone yet with your claims.
Direct quote from you: “as if there aren’t western backdoors built into all of these.”
And again, to date, this has not been the case. No manufacturer has been building backdoors into devices. Other hackers finding exploits and continuing to exploit them on behalf of governments is not the same thing. It’s detectable, it’s measurable, and it only works on small groups of devices, not an entire population.
Cool, then proof.
Something similar was found on another system by a certain Korean carmaker and silently patched. I’m positive these types of systems will all be exploited more in the future, and need to be completely overhauled. Cars should not be reachable entities on any sort of network, especially one without proper IAC restrictions. They should be consumers of said information at best, but even that will eventually be impersonated somehow. We have the potential for turnkey system with all the damn devices running around that can be used as a 3-key-minimum system to ensure proper identity, but that would be giving consumers TOO MUCH CONTROL 🤣
Lol I’m not denying anything but your misguided comment. It’s not accurate.
The NSA activities Snowden leaked were specifically happening in data and telecom centers to snoop traffic in transit. He make known some secret programs about exploiting and compromising devices, but of that’s already known as a possibility. He never detailed anything about backdoors on phones from manufacturers as you’ve suggested.
These are neither confirmed, nor have ever been proven, and don’t deal with phones.
The first link is about networking hardware, which has already been found by security researchers long ago.
The second is about an attempt at doing something like a backdoor that never came to fruition.
The last link has never been observed or proven, and how it would work is impossible to know. Having a “backdoor” on a CPU is meaningless without the other attached hardware to work with. Some would say impossible, and made up.
Yes, which is a compromised device. A Windows machine without any antivirus or malware protection is a compromised device, for example.
Read the back half of this writeup and realize the target audience should be people with basic security steps taken. No journalist going out of their way to talk to whistleblowers is going to have a default settings phone, or any phone on them at all for that matter I would expect.
What backdoors are pre installed on western phones? I’m talking actual backdoors on the device itself. I feel researches would have already found and altered to some very publicly.
Who would subscribe to this? If it’s just CNN all the time, that sounds like a damn nightmare.
Already addressed in a different comment, but yes.
Not at all.
Any of these being different would not make this possible for a number of reasons. The author is talking about journalists and security minded people being at risk, but it’s hard to imagine anyone going above the defaults to protect would be at much risk if they didn’t take one or two of these steps as protection.
I assume from your comment you’re thinking “compromised device” to mean attacked, and those are synonymous. It’s just a phone with no protections.
Do not care at all.
Yeah, this sensational as a headline. It’s a clever idea that is not simple, requires an already compromised device and user, and won’t work except very specific conditions.
deleted by creator
THIS IS THE THING YOU MAKE A POST ABOUT???
Well if you go with one of the open racks, just account for the cooling and don’t bunch everything together like in the post. Cramming things end to end without active cooling involved is just asking for them to take thermal damage. If each individual item you put in has directional cooling (ingress/egress), identify where they are, and make space. Just getting a cheap slot cooler to put at the top of bottom of one of the open racks would probably be fairly okay as long as there is airflow to each device.
This isn’t new. Port Knocking was used similarly in the 90s for a lot of backdoors, and I believe the Intel IME/VT/PSP/TPM fiasco was essentially what this is, and was exploited similarly to lock out owners once compromised.