Announcement

Collapse
No announcement yet.

AMD PSP Affected By Vulnerability

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #71
    Originally posted by rene View Post
    suddenly looks like a viable alternative to use an MIPS64 Sgi Octane as a daily driver ;-)
    40 Likes, 1 Comments - RenézuCode (@renerebe) on Instagram: "#celebrating#my#precious#vintage#hardware#collection#sgi#octane#mips#mips64#64bit#t2sde#linux#3d#..."


    a SPARCstaiton 2 is just a bit too slow:


    , …
    Heh, Rene I'll raise you a SparcStation 20 with dual SM81s ... and if that isn't enough I have 3 hulks of SS1000 that I'm working getting running on (still) I have enough CPUs and RAM and main board cards to fully populate one with 8x 85Mhz SuperSparc IIs and 4GB ram.... I also have a SparcPlug Minitower I can slap a dual 142Mhz MBus card in... probably the neatest thing I have.
    Last edited by cb88; 12 January 2018, 03:07 AM.

    Comment


    • #72
      Originally posted by cb88 View Post

      Heh, Rene I'll raise you a SparcStation 20 with dual SM81s ... and if that isn't enough I have 3 hulks of SS1000 that I'm working getting running on (still) I have enough CPUs and RAM and main board cards to fully populate one with 8x 85Mhz SuperSparc IIs and 4GB ram.... I also have a SparcPlug Minitower I can slap a dual 142Mhz MBus card in... probably the neatest thing I have.
      well, the point of me mentioning the SPARCstation 2 was low-end, you could raise that down to an 1st gen SPARCstation. However, to raise that down, I also recently got my am386dx40 w/ Cyrix FastMath! 387 out of my parents attic with just 4MB RAM. The RAM will make it really hard to get a recent Linux booted, if I try that I probably have to find some more vintage RAM sticks. However, the SPARCstation 2 w/ 16 MB RAM is really at the border of being endurable (for text terminal) work. It may be more fun to stick a little bit more RAM into that and have a more useful yet esoteric system over the am386 ;-)

      Comment


      • #73
        Originally posted by Spooktra View Post
        This can't possibly be!!! We have been treated to one article after another and endless posts on forums around the net from all the AMD fanboys crowing that AMD processors are secure and Intel's are crap and blah blah blah. Now we have an article about a security issue with AMD processors. Allow me to beat the AMD faithful in declaring this article FAKE NEWS!!!

        Seriously though, I think this article needs to be punched up a bit with a good recipe for crow along with a nice wine recommendation.

        Man, I wish I could get a RISC-V based desktop cpu with a nice BSD based OS and leave Linux, Windows, Intel and AMD behind and never look back.
        Um, buh-bye then.... You go right ahead, just keep in mind they are designing a 90's era central processor, that uses a whole shit ton of arm cores to provide functionality.... The screwed up part? At least one of those arm cores is faster than the actual central processor is gonna be!. Its fucking retarded. They would have been better off just licensing arm in the first place, it's a more modern architecture and it's faster than what RISC-V will end up being and it has a bunch arm cores in it anyways where at least one of them is actually faster than the main CPU....

        Comment


        • #74
          Originally posted by numacross View Post
          How are you using a modern computer that's filled with firmware-driven CPUs with DMA?
          Fortunately it is still quite easy not to use such computers for specific tasks that are nearly performance independent while using such machines for tasks that are performance dependend on the other hand. You see more and more the scenario to use encapsulated (virtual) machines as well.
          So as a result you can encapsulate the traffic between the "insecure" and fast machines by using "secure" libre boot machines in specific scenarios.

          And for the other scenarios, well, you will have to live with the downsides of modern, powerful machines. But although it might be absolutely wrong in terms of privacy that someone knows which TV station you are currently watching it won't harm you directly in any kind of way. So you can temporarily live with this situation.
          (Which doesn't mean you shouldn't flood the servers of the responsible companies and organizations with nasty emails and tell everyone about the insecurity - mass media preferred).

          Comment


          • #75
            Originally posted by oooverclocker View Post
            Fortunately it is still quite easy not to use such computers for specific tasks that are nearly performance independent while using such machines for tasks that are performance dependend on the other hand.
            So you're running a 386 (but not the SL variant since it already has SMM)? Of course with a HDD that doesn't expose UDMA but only PIO

            A floppy drive or ZIP might be a good alternative. Obviously on the parallel port and not the IDE version for the latter.

            Originally posted by oooverclocker View Post
            You see more and more the scenario to use encapsulated (virtual) machines as well.
            Unless they are using hardware hypervisors (like the IBM mainframe stuff for example) it's not security but rather convenience. Since there's a lot of broken things in x86 (https://blog.invisiblethings.org/pap...86_harmful.pdf) even virtualization can be worked around.

            Originally posted by oooverclocker View Post
            So as a result you can encapsulate the traffic between the "insecure" and fast machines by using "secure" libre boot machines in specific scenarios.
            Running libreboot doesn't magically turn your peripherals into slow, CPU-driven dumb devices. They still control themselves and if placed on a DMA-capable bus it's game over, theoretically of course

            Originally posted by oooverclocker View Post
            And for the other scenarios, well, you will have to live with the downsides of modern, powerful machines. But although it might be absolutely wrong in terms of privacy that someone knows which TV station you are currently watching it won't harm you directly in any kind of way. So you can temporarily live with this situation.
            Unless the times are such in which watching the wrong TV station will put you on a Special-Santa-List-Of-People-To-Sent-To-A-Gulag. It's been done before and we're going back there really quickly too...

            Originally posted by oooverclocker View Post
            (Which doesn't mean you shouldn't flood the servers of the responsible companies and organizations with nasty emails and tell everyone about the insecurity - mass media preferred).
            There's a lot of scientific papers presented at conferences that expose those things, but... not a peep of it in the media. And the general population simply doesn't care.

            Comment


            • #76
              Originally posted by madscientist159 View Post
              News flash: it can't be disabled. Try not to believe every "fact" you hear online.
              But it is all too easy to believe when Purism says they can "disable" or "neutralize" the ME, because that is what the posters your responded to and like-minded want to hear. The pesky fact that ME is actually a hardware implementation that you cannot even remove by completely eliminating its flash memory?
              Or is actually one of "reduce functionality by overwriting some parts but not others so that ME runs for a while and then appears to stop doing the things it usually does" approach by me_cleaner, or the "ask ME/PSP nicely to please disable itself" HAP bit or BIOS setting, which convinced them that ME/PSP can be disabled?

              I don't know, but I have no time to think about it now, must respond to the email of a Nigerian Prince who promised me tons of gold if I pay for shipping.

              Comment


              • #77
                Nobody believed CTS-Labs, but AMD has confessed: https://community.amd.com/community/...-labs-research

                They're not so shady now, are they?

                Comment


                • #78
                  Big corporations only admit their "wrongdoings" when they have no other option but to.

                  (And, they usually do it in a way that downplays the important issues that others have already discovered/revealed...)

                  Anyway, the PSP and likes are, obviously, here to stay.

                  So, we will have to look elsewhere, for Privacy and Security.

                  (Probably to some evolution of "open/free/libre hardware" single-board computers: https://www.crowdsupply.com/eoma68/micro-desktop + https://www.parallella.org/about/)

                  Comment


                  • #79
                    Originally posted by Vistaus View Post
                    Nobody believed CTS-Labs, but AMD has confessed: https://community.amd.com/community/...-labs-research

                    They're not so shady now, are they?
                    Of course they're shady.

                    Their reasons for not waiting the usual 90 days before disclosure are bogus. Then there's the connection to Viceroy, a know short seller that is under investigation in at least Germany for their attempts at stock manipulation through bogus claims. Then there's the beyond silly green-screened videos using stock backgrounds. Then there's the point that they've completely overblown the severity of these "vulnerabilities". Then there's... I'm too lazy to complete the list, but there's more.

                    Comment


                    • #80
                      Originally posted by Vistaus View Post
                      Nobody believed CTS-Labs, but AMD has confessed: https://community.amd.com/community/...-labs-research

                      They're not so shady now, are they?
                      No AMD have not confessed.

                      No such vulnerability exists as CTS-Labs said.

                      Note how on AMDs page each issue is pre-faced with "Issue: Attacker who already has compromised the security of a system..."

                      All of these exploits require you have have physical access to the machine, to have local root access, to have installed a custom BIOS and have already executed another exploit to gain access to the PSP. The last exploit is also to do with a 3rd party chipset that both AMD and Intel motherboards use.

                      CTS-Labs are scammers and criminals who deserve prison.

                      Comment

                      Working...
                      X