2

Duchy on Twitter: "The ultimate backdoor doesn't exi- https://t.co/BML1THAe...

 2 years ago
source link: https://twitter.com/DuchyRE/status/1489925268571664388
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client
Don’t miss what’s happening
People on Twitter are the first to know.

Thread

See new Tweets

Conversation

Replying to
I remember someone in the vx scene in 2007 also found undocumented instructions, hmmm.
That was a priv esc backdoor iirc
Show replies
Replying to
Intel Red D̶o̶o̶r̶ Unlock
W28-VHe5?format=jpg&name=240x240
youtube.com
Flawed Security System (Simpsons Season 4 Episode 17)
Mr. Burns has a security system that turns out to be worthless.
Replying to
Aww man. How is anything secure?!
Open-source architecture is the way to go
It was skyscraper size backdoor in log4j for 8 years
Show replies
Oh shit! I can’t wait for the videos to get released so I can check it out. So jealous -_-
Replying to
Excuse me, what?
Replying to
Imagine thinking there is such a thing as digital security. Imagine thinking digital 'money' can ever be secure.
The former is for granted, but the latter ... we haven't heard of a "hacker" becoming a trillionaire overnight, yet, and even "analog money" is handled with (possibly equally vulnerable) systems, from things like SWIFT to small local banks' servers.
Show replies
Replying to

Once again I'm reminded how the more I learn the less I know.

I recognize some of those words, but can't follow the whole thing.

What does this mean in a practical sense?

Practically speaking, if you can perform the unlock procedure, you're able to use these undocumented instructions to modify the microcode running on the machine. I would imagine the possibilities from that are nearly endless.
Show replies
Replying to
can somebody explain in detail what this means and the implications? was this vulnerability an oversight or intentional is the bigger question🤔
It's a way of making a machine break, that most people are unlikely to think about.
Show replies
Replying to
*everyone proceeds to ignore the DFx unlock requirement*
Replying to

Is it a new one?

Fun method they had of discovering them, I suggest everyone who missed their talk(s) watch them (not sure which conference has the best recording, though).

New to Twitter?
Sign up now to get your own personalized timeline!
Sign up with Apple
By signing up, you agree to the Terms of Service and Privacy Policy, including Cookie Use.
Relevant people
Linux connoisseur of the days past. Some stuff at . Opinions are my own and not of my employer. Profile art by .

Trending now

Trends for you
K-pop · Trending
#대열아_기다릴게_고마워
12.3K Tweets
Trending in South Korea
1,622 Tweets
Event · Trending
발렌타인데이 누구
2,088 Tweets
Trending in South Korea
신사와 아가씨
2,428 Tweets
Trending in South Korea
#앙스타_플미_줄이기_캠페인
5,711 Tweets
Show more

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK