1 |
I think the paper on Intel issues Mick is referring to is the one I |
2 |
linked not too long ago: |
3 |
http://blog.invisiblethings.org/papers/2015/x86_harmful.pdf |
4 |
|
5 |
It seems like you're looking for something like the EFF's "surveillance |
6 |
self-defense"[1] site but with some stuff specific to Gentoo. |
7 |
|
8 |
[1]: https://ssd.eff.org/ |
9 |
|
10 |
-- |
11 |
0x7D964D3361142ACF |
12 |
|
13 |
On Mon, Mar 28, 2016, at 10:25, James wrote: |
14 |
> Mick <michaelkintzios <at> gmail.com> writes: |
15 |
> |
16 |
> > > Ahh, OK. So secure communications between all these clients. |
17 |
> > > The two big players for client-side encryption for email or messaging |
18 |
> > > data would be GPG and OTR; |
19 |
> |
20 |
> Good 2 know. I'll keep searching for docs. |
21 |
> |
22 |
> > Also S/MIME encryption of the email message body using SSL certificates |
23 |
> > achieves the same end result (i.e. encrypted payload) as GnuPG offers. |
24 |
> > For GPG you may need a plugin (e.g. enigmail on T'bird) or something |
25 |
> > similar for phone clients, but S/MIME is usually available by default for |
26 |
> > most email clients and platforms. |
27 |
> |
28 |
> OK, so maybe I'll test out a few devices, provide some feedback and then |
29 |
> seen about a (gentoo wiki) page. If the community is not interested in |
30 |
> that I bet these guys would put up some sort of community cook-book on |
31 |
> this topic:: [1] |
32 |
> |
33 |
> Dont know who they are, but they seem to be on the right track, |
34 |
> and they big on Gentoo! |
35 |
> |
36 |
> > A word of caution: Snowden warned us that the end devices do not ossess |
37 |
> > strong enough randomness generators to ensure that the encryption they |
38 |
> > perform cannot be reverse engineered. |
39 |
> |
40 |
> Intel has long been hiding extra hardware inside of their processors, for |
41 |
> a |
42 |
> variety of nefarious activities. Here is a link where they now let the |
43 |
> retail world in on what has been going on for decades [2]. |
44 |
> |
45 |
> This is why the US gov keeps hyping how bad security is, so the gov can |
46 |
> take |
47 |
> steps and the sub-contract out the details for billions (it's the new |
48 |
> cold |
49 |
> war and we have to be scared enough to get the govs to protect us, right? |
50 |
> And all of that horse_feathers.... |
51 |
> |
52 |
> Anyone doing gate/register design/validations with Intel parts, decades |
53 |
> ago, |
54 |
> stumbled into areas of the the intel chips with hidden hardware. Just |
55 |
> slice |
56 |
> them and put them under any high res scanner nowadays.... Sadly, |
57 |
> everybody |
58 |
> in the chip bidness does this routinely now. SoCs are all full |
59 |
> of this crap. |
60 |
> |
61 |
> The old AT&T phone switches (think 3B2) had this sort of 'undefined |
62 |
> hardware'. Nothing new 'signal intercept' is good to search on, but most |
63 |
> of the Intel (get the pun?) has been scrubbed form the internet on |
64 |
> 'signal intercept'; particularly the Rf stuff. |
65 |
> |
66 |
> > A recent article shared on this M/L also showed that anything with Intel |
67 |
> > inside® can be deemed as intentionally weakened to enable potential |
68 |
> > interference with our privacy. |
69 |
> |
70 |
> Got that link handy? Part of the SSL v2 v3 stuff? I was hoping somebody |
71 |
> would write up a summary, and detail action plans from a gentoo |
72 |
> workstation, gentoo server and gentoo-cluster perspective on the state |
73 |
> of SSL.* issues. |
74 |
> |
75 |
> > Therefore treat your encrypted communications and their content with |
76 |
> > caution, because you don't know how private these may remain in the |
77 |
> > future. |
78 |
> |
79 |
> Kinda like a very gorgeous woman, with a low credit score (yak yak yhak)? |
80 |
> Or like an 'old bug' flying towards the light (ZAP)? |
81 |
> Certainly, but, the low rent hacks might be held at bay a little longer. |
82 |
> Still, we should make the effort to streamline and document pathways, |
83 |
> with |
84 |
> ample warnings of cautions. |
85 |
> |
86 |
> |
87 |
> [1] https://wiki.installgentoo.com/index.php/Encryption |
88 |
> |
89 |
> [2] |
90 |
> http://www.extremetech.com/extreme/184828-intel-unveils-new-xeon-chip-with-integrated-fpga-touts-20x-performance-boost |
91 |
> |
92 |
> |