You can't trust anything. But you can trust Linux more than Windows since the internals are open source. So a heavy malware will be harder to hide in Linux compared to Windows. But anything is possible. Someone even mentioned injectable firmware to invade computers at the processor level.millpond wrote: I do not trust Linux either as some of it key networking components (think heartbeat) are derived from shadowy figures and academics, some hearkening all the way back to Darpanet.
Scheduled Maintenance: We are aware of an issue with Google, AOL, and Yahoo services as email providers which are blocking new registrations. We are trying to fix the issue and we have several internal and external support tickets in process to resolve the issue. Please see: viewtopic.php?t=158230
How to install windows 10
-
- Posts: 431
- Joined: 2018-11-05 21:30
Re: How to install windows 10
- Head_on_a_Stick
- Posts: 14114
- Joined: 2014-06-01 17:46
- Location: London, England
- Has thanked: 81 times
- Been thanked: 133 times
Re: How to install windows 10
No need for that, most modern processors already have nice, convenient side-channels for the crackers to use.MagicPoulp wrote:injectable firmware to invade computers at the processor level
Works in both Windows and GNU/Linux as well, which is nice.
deadbang
-
- Posts: 431
- Joined: 2018-11-05 21:30
Re: How to install windows 10
?Head_on_a_Stick wrote:No need for that, most modern processors already have nice, convenient side-channels for the crackers to use.
Which side channels are you talking about?
- GarryRicketson
- Posts: 5644
- Joined: 2015-01-20 22:16
- Location: Durango, Mexico
Re: How to install windows 10
The ones used for remote access, maybe ,
most modern processors already have nice, convenient side-channels for the crackers to use
Lot's of interesting info , from 1 result:
https://www.usenix.org/system/files/con ... -masti.pdf
most modern processors already have nice, convenient side-channels for the crackers to use
Lot's of interesting info , from 1 result:
https://www.usenix.org/system/files/con ... -masti.pdf
From another, but I will let the OP do their own searching, if they want to find where,and more details:Side channels remain a challenge to information flow
control and security in modern computing platforms. Re-
source partitioning techniques that minimise the number
of shared resources among processes are often used to
address this challenge. In this work, we focus on multi-
core platforms and we demonstrate that even seemingly
strong isolation techniques based on dedicated cores can
be circumvented through the use of thermal channels.
Specifically, we show that the processor core tempera-
ture can be used both as a side channel as well as a
covert communication channel even when the system im-
plements strong spatial and temporal partitioning. Our
experiments on an Intel Xeon server platform demon-
strate covert thermal channels that achieve up to 12.5 bps
and weak thermal side channels that can detect processes
executed on neighbouring cores. This work therefore
shows a limitation in the isolation that can be achieved
on existing multi-core systems.
2018--2019, new discoveries are being made dailyNew Cache Side
-
Channel Attack Techniques
•
2005: L1 cache
Prime+Probe
and
Evict+Time
attacks using SMT
•
2007: L1 cache
Prime+Probe
attacks without SMT
•
2010: L1 cache
Flush+Reload
attacks without SMT
•
2014: Cross
-
core
Flush+Reload
attacks
•
2015: Cross
-
core
Prime+Probe
attacks
•
2016: Cache storage
-
channel attacks
•
2016:
Cross
-
core
Flush+Flush
attacks
•
2017:
Cross
-
core
Prime+Abort
attacks
•
2017: Side channels leveraging Intel Processor Trace
"What we expect you have already Done"
==========
Old Website
======================
For the Birds
==================
What Does a Parrot Know About PTSD?
==========
Old Website
======================
For the Birds
==================
What Does a Parrot Know About PTSD?
- None1975
- df -h | participant
- Posts: 1398
- Joined: 2015-11-29 18:23
- Location: Russia, Kaliningrad
- Has thanked: 46 times
- Been thanked: 68 times
Re: How to install windows 10
Check this.MagicPoulp wrote:Which side channels are you talking about?
OS: Debian 12.4 Bookworm / DE: Enlightenment
Debian Wiki | DontBreakDebian, My config files on github
Debian Wiki | DontBreakDebian, My config files on github
-
- Posts: 431
- Joined: 2018-11-05 21:30
Re: How to install windows 10
Ah ok it is related to the timing attack first referred to as Spectre and Meltdown. And they say CPUs need a new architecture design.
I thought it was something else.
Here is another thing. Using more that just software, it is possible to use electromagnetic measurements to hack a CPU. Like reading the "mind" of the computer using probabilistic guesses.
I thought it was something else.
Here is another thing. Using more that just software, it is possible to use electromagnetic measurements to hack a CPU. Like reading the "mind" of the computer using probabilistic guesses.
- Head_on_a_Stick
- Posts: 14114
- Joined: 2014-06-01 17:46
- Location: London, England
- Has thanked: 81 times
- Been thanked: 133 times
Re: How to install windows 10
There are *many* potential side-channels and more are added with each new processor, the developers just can't help themselves...MagicPoulp wrote:I thought it was something else
deadbang
Re: How to install windows 10
Dunno about side-channels, but the real issue id ring0 CORES hidden in modern chips. Can network with system 'off'.
As for banking, 95% of boogerware is designed specifically to grab the info - usually with screen captures and keyloggers.
As for banking, 95% of boogerware is designed specifically to grab the info - usually with screen captures and keyloggers.