...
EgyptSearch Forums Post New Topic  Post A Reply
my profile | directory login | register | search | faq | forum home

  next oldest topic   next newest topic
» EgyptSearch Forums » Deshret » Intel Based Computers: Those dastardly Israeli Ashkenai Jews

 - UBBFriend: Email this page to someone!    
Author Topic: Intel Based Computers: Those dastardly Israeli Ashkenai Jews
Narmerthoth
Member
Member # 20259

Rate Member
Icon 1 posted      Profile for Narmerthoth     Send New Private Message       Edit/Delete Post   Reply With Quote 
About 2 years ago I wrote here about the perils of any black person with DAP using an Intel based computer. One with an "Intel Inside" sticker or a custom using an Intel CPU.
Intel Corp has been pretty much taken over by the Israeli Jews and although their HQ is in Cali, much of their CPU design is done in Israel.
Those dirty Israeli Jews can't be trusted as far as you can toss an elephant and 2 years ago I cautioned about using computers based on their technology because of the backdoors into the system allows them to access your system at will.
Can you image a foreign country has not only the ability, but the approval of the US government to freely access computer system of American (and other countries) computers?

Well, for those who didn't believe me and were thinking I am just a paranoid black man, think again.
Now, there is irrefutable proof of what I stated, here.

http://www.theregister.co.uk/2017/05/05/intel_amt_remote_exploit/

Exploit to pwn systems using vPro and AMT

For your information, here's basically how today's computers.
If you have an Intel or AMD CPU, inside of the CPU there is another CPU that is dedicated to maintaining the main CPU's functionality, such as power levels, power-down and sleep processes, etc.
Users like yourself have no direct access to this dedicated internal CPU.
However, when Intel Israel, who is the team that designs this internal CPU completed the design, they left a backdoor into it so that they can access any computer that has an Intel processor.
As long as the computer is on-line and Internet connected, they can access it, view and downlaod them, and even place malware on them that directly sends updates on usage automatically.

Why?
Well, one reason is supposed a US Senator has a computer and is accessing porn sites in his downtime. Suppose that senator voted to oppose funding Israel's annual welfare payment the US makes to Israel every year since the 1950s.
Well, then all Israel has to do is use the backdoor into his computer to gain access to everything the computer has been used for, including every time he made internet access to porn site.
Next day the emal his Internat Porn history to him and advise him to rethink his opposition to funding Israel.
BINGO!
That senator changes his vote from Nay to Yay and the taxpayer funded welfare continues to flow into Israel's pockets.

Likewise, consider that American/Israeli Jews play a key role in the FBI's CONINTEL program. They spy on, collect info and file reports to the FBI on any emerging US black leaders. They do this in conjunction with other Jew based organizations such as The ADL, The JDL, and the NAACP.

I believe their primary data storage and processing center is in Israel, where it is beyond US law.

SO, to keep your personal and professional data safe and secure, try never to use an Intel based computer system.
Rather, use one with an AMD processor inside.

Posts: 4693 | From: Saturn | Registered: Apr 2012  |  IP: Logged | Report this post to a Moderator
Ish Geber
Member
Member # 18264

Member Rated:
4
Icon 8 posted      Profile for Ish Geber     Send New Private Message       Edit/Delete Post   Reply With Quote 
Are you speaking if the BIOS (basic input output system) when you refer to another CPU?

Of course remotely accessing your system was the initial intend, which has been possible for many years now. But this is about bypassing the security system, with only a few easy steps.


quote:
Normally, AMT is password protected. This week it emerged this authentication can be bypassed, potentially allowing miscreants to take over systems from afar or once inside a corporate network. This critical security bug was designated CVE-2017-5689. While Intel has patched its code, people have to pester their hardware suppliers for the necessary updates before they can be installed.

Posts: 22245 | From: האם אינכם כילדי הכרית אלי בני ישראל | Registered: Nov 2010  |  IP: Logged | Report this post to a Moderator
Narmerthoth
Member
Member # 20259

Rate Member
Icon 1 posted      Profile for Narmerthoth     Send New Private Message       Edit/Delete Post   Reply With Quote 
Intel relabeled their internal management processor as AMT (Advanced Management Technology), by it is still a real hardware based processor and not controlled by the BIOS.
The BIOS is in control of the main processor, but the AMT processor is a hardware CPU inside of the main CPU.
It runs continuously, non-stop intergrated within the main processor, even when the system is powered down.

It is based on a universal specification called IPMI (Intelligent Platform Management Interface), initially created by Intel, but now universally controlled by a multitude of computer companies such as AMD, Dell, IBM, HP, Etc.

https://en.wikipedia.org/wiki/Intelligent_Platform_Management_Interface

The Intelligent Platform Management Interface (IPMI) is a set of computer interface specifications for an autonomous computer subsystem that provides management and monitoring capabilities independently of the host system's CPU, firmware (BIOS or UEFI) and operating system. IPMI defines a set of interfaces used by system administrators for out-of-band management of computer systems and monitoring of their operation. For example, IPMI provides a way to manage a computer that may be powered off or otherwise unresponsive by using a network connection to the hardware rather than to an operating system or login shell.

The article makes it seems as though the problem is just weak passwords, but it is much more than this since most computer user don't even understand that the processor exists in their boxes.

Never use Intel!
Get yourself one of these or a system based on AMD.
https://arstechnica.com/gadgets/2017/05/amd-ryzen-5-review-1600x/
AMD has an internal IPMI processor also, but they have no design facility in Israel and don't intentionally leave backdoors into their CPU.
The absolute worst choice of a computer for a progressive black person is an Intel based system running MS Windows. This system will be totally insecure.

Posts: 4693 | From: Saturn | Registered: Apr 2012  |  IP: Logged | Report this post to a Moderator
Ish Geber
Member
Member # 18264

Member Rated:
4
Icon 1 posted      Profile for Ish Geber     Send New Private Message       Edit/Delete Post   Reply With Quote 
This is a 2011 article:


quote:
How to Remotely Control Your PC (Even When it Crashes)

By Justin Garrison on March 28th, 2011



Being able to remotely control your computer is an age old geek trick. But what about changing BIOS settings or installing an operating system remotely? With Intel AMT KMS this is within reach for any geek with the right hardware.

Intel vPro is a management platform built into Intel processors and other hardware that allows companies to manage their desktops and laptops out-of-band (OOB). That means the computers can be managed no matter if the computer in on or off, and even if the operating system has failed or there is no hard drive present.



https://www.howtogeek.com/56538/how-to-remotely-control-your-pc-even-when-it-crashes/


They don't make a fuss out of it, it is more so in the "vulnerability", by passing the "security system". This of course could've be done on purpose, as you indicate.


quote:
Get Remote Manageability That Goes the Distance

As computing extends across business offices to remote service environments, there are more devices to manage. Reduce on-site support costs with Intel® AMT for new 7th Generation Intel® Core™ vPro™ processor-based devices for remote discovery, protection, and recovery.1 Even without power or in the case of operating system failure, Intel® AMT out-of-band capabilities keep you in control with minimal effort.

https://www.howtogeek.com/56538/how-to-remotely-control-your-pc-even-when-it-crashes/
Posts: 22245 | From: האם אינכם כילדי הכרית אלי בני ישראל | Registered: Nov 2010  |  IP: Logged | Report this post to a Moderator
Ish Geber
Member
Member # 18264

Member Rated:
4
Icon 1 posted      Profile for Ish Geber     Send New Private Message       Edit/Delete Post   Reply With Quote 
After doing some research I found this 4 year old article. I can't verify to what degree this is correct.


Expert Says NSA Have Backdoors Built Into Intel And AMD Processors

https://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/

Posts: 22245 | From: האם אינכם כילדי הכרית אלי בני ישראל | Registered: Nov 2010  |  IP: Logged | Report this post to a Moderator
Narmerthoth
Member
Member # 20259

Rate Member
Icon 1 posted      Profile for Narmerthoth     Send New Private Message       Edit/Delete Post   Reply With Quote 
Most of the CPU designing teams for intel are located in California and Israel.

Most of AMD's CPU design teams are located in the US, Spain and India.

Of all the above engineering team locations, Israel is the most dangerous and the besides the US, the most likely to build-in security holes.

EFF (The Electronic Frontier Foundation- https://en.wikipedia.org/wiki/Electronic_Frontier_Foundation) Warns Most Of Intel's Chipsets Contain 'A Major Security Hazard

By Peter Eckersley and Erica Portnoy
May 8, 2017


The EFF is issuing a warning about the "tiny homunculus computer" in most of Intel's chipsets -- the largely-undocumented "Management Engine" which houses more than just the AMT module. An anonymous reader quotes their report:

While AMT can be disabled, there is presently no way to disable or limit the Management Engine in general. Intel urgently needs to provide one....vulnerabilities in any of the other modules could be as bad, if not worse, for security. Some of the other modules include hardware-based authentication code and a system for location tracking and remote wiping of laptops for anti-theft purposes... It should be up to hardware owners to decide if this code will be installed in their computers or not. Perhaps most alarmingly, there is also reportedly a DRM module that is actively working against the user's interests, and should never be installed in a Management Engine by default...

While Intel may put a lot of effort into hunting for security bugs, vulnerabilities will inevitably exist, and having them lurking in a highly privileged, low-level component with no OS visibility or reliable logging is a nightmare for defensive cybersecurity. The design choice of putting a secretive, unmodifiable management chip in every computer was terrible, and leaving their customers exposed to these risks without an opt-out is an act of extreme irresponsibility... EFF believes that Intel needs to provide a minimum level of transparency and user control of the Management Engines inside our computers, in order to prevent this cybersecurity disaster from recurring. Unless that happens, we are concerned that it may not be appropriate to use Intel CPUs in many kinds of critical infrastructure systems.

TLDR: "We have reason to fear that the undocumented master controller inside our Intel chips could continue to be a source of serious vulnerabilities in personal computers, servers, and critical cybersecurity and physical infrastructure."

https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it

Posts: 4693 | From: Saturn | Registered: Apr 2012  |  IP: Logged | Report this post to a Moderator
Narmerthoth
Member
Member # 20259

Rate Member
Icon 1 posted      Profile for Narmerthoth     Send New Private Message       Edit/Delete Post   Reply With Quote 
The EFF is involved with almost all forms of computer operations and programming.
If AMD CPU's had the same issues as Intel, EFF would definitely include AMD in the list.

Since everyone here on ES are dependent on computers to achieve their research goals, and sometimes these projects are sensitive to Euro-binos, one should be as careful as possible in avoiding data compromise.

The internal Maintenance processor in Intel CPUs is totally inaccessible to all but Intel, and most likely, the national intelligence agencies such as CIA, FBI, Mossad, who encourage and very likely pay Intel for maintaining this hidden hardware backdoor.
Countries like China understand this which is why for sensitive national projects, China won't deploy an Intel CPU, but do use AMD and mostly internally designed CPUs based on MIPS.

--------------------
Selenium gives real life and true reality

Posts: 4693 | From: Saturn | Registered: Apr 2012  |  IP: Logged | Report this post to a Moderator
Mike111
Banned
Member # 9361

Rate Member
Icon 1 posted      Profile for Mike111   Author's Homepage     Send New Private Message       Edit/Delete Post   Reply With Quote 
Intel once tried to make the owner of each computer discoverable.


Introduction and Background

With the Pentium III, Intel introduced a new feature called the processor serial number. This is a feature that according to Intel, would usher in the next generation of software applications for the world of networked computing. The processor serial number (PSN) is a unique identifier for an individual microprocessor that cannot be modified, but can be read by software to provide identification of a processor. Stronger identification of a system or user can be achieved through combined use of the PSN with other factors such as a username and a password.


http://courses.ischool.berkeley.edu/i224/s99/GroupG/psn_outline.html


They were told to stop it, but I don't know if they ever did.

Posts: 22721 | Registered: Oct 2005  |  IP: Logged | Report this post to a Moderator
Narmerthoth
Member
Member # 20259

Rate Member
Icon 1 posted      Profile for Narmerthoth     Send New Private Message       Edit/Delete Post   Reply With Quote 
They haven't.
Even today, both Intel and AMD embed unique serial numbers in each processor for purposes of yield accuracy and redeployment of CPU that have internal flaws.
For example, if a specific CPU is manufactured that has eight cores, and a fatal problem is discovered in testing in one of two cores, then Intel/AMD has the option of disabling one of two internal cores to make that CPU a 6 core device rather than it's original eight core design. That way they don't have to totally trash the defective device by change the part number and sell it as a lower end product.
Since they manufacture millions of devices in the same family, they had to find a way to keep track of each device as it went through testing.
The unique device serial number is accessible by the hidden internal processor being mentioned above which is used to evaluate all internal functions of the CPU during testing and even after the product is sold.

--------------------
Selenium gives real life and true reality

Posts: 4693 | From: Saturn | Registered: Apr 2012  |  IP: Logged | Report this post to a Moderator
   

Quick Reply
Message:

HTML is not enabled.
UBB Code™ is enabled.

Instant Graemlins
   


Post New Topic  Post A Reply Close Topic   Feature Topic   Move Topic   Delete Topic next oldest topic   next newest topic
 - Printer-friendly view of this topic
Hop To:


Contact Us | EgyptSearch!

(c) 2015 EgyptSearch.com

Powered by UBB.classic™ 6.7.3