Bitcoin Forum
April 25, 2024, 01:26:41 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 »  All
  Print  
Author Topic: intel vPro processor backdoor to make securing bitcoin impossable?  (Read 9412 times)
justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
September 28, 2013, 08:52:58 PM
 #21

I feel safer already. Some web site I've never heard of before quotes an unnamed Intel spokesperson who promises that nothing bad is going on.

http://news.techeye.net/chips/intel-responds-to-always-on-3g-processor-conspiracy

Quote
Every Intel vPro CPU ships with an undocumented 3G chip inside, according to a report, which is visible on the 3G network even when a PC is not turned on.

The idea is to enable the Anti Theft 3.0 technology, found on every Core i3, i5 and i7 CPU after Sandy Bridge, meaning almost every new CPU from Intel may have an embedded and hidden 3G connection Intel didn't bother to tell you about, Softpedia reports.

While it is usually preferable to tackle the question at hand and not attack the source, the rumour appears to come from the PopularResistance blog, where the story is illustrated with a conspiracy-drenched mock-up of an all seeing eye with Intel in the middle, mentions of creeping fascism in the copy, and peppered with liberal doses of paranoia, a common theme in certain circles - not soothed by proof of the US government's surveillance dragnet.

Although the story is not entirely unfeasible, given the revelations from NSA whistleblower Edward Snowden about backdoors installed into consumer and enterprise technology, as well as the NSA itself setting security certification standards, the actual concrete evidence is not there.

Freelancer Jim Stone, of PopularResistance, claims: "You see, Core vPro processors work in conjunction with Intel’s new Anti Theft 3.0, which put 3g connectivity into every Intel CPU after the Sandy Bridge version of the I3/5/7 processors. Users do not get to know about that 3g connection, but it IS there."

Stone goes on to say, speaking of the vPro: "From the technical viewpoint of someone who worked for an intelligence agency, I call B.S. on Intel, avoid these processors like the plague!"

An Intel spokesperson, responding to TechEye, said: "First, Intel does not participate in government efforts to decrease security in technology, and does not include backdoors for unauthorised access into its products

"Second, the piece on vPro is based on incorrect information, assumptions and misunderstandings; it is wrong on many levels," the spokesperson said. "The underlying technology is not new and has been in place for more than 7 years."

When asked if consumers or customers would appreciate hidden 3G technology in Intel CPUs, the spokesperson said: "I would note that the Snowden leaks was not mentioned in the vPro article that has been circulating".
1714008401
Hero Member
*
Offline Offline

Posts: 1714008401

View Profile Personal Message (Offline)

Ignore
1714008401
Reply with quote  #2

1714008401
Report to moderator
Bitcoin mining is now a specialized and very risky industry, just like gold mining. Amateur miners are unlikely to make much money, and may even lose money. Bitcoin is much more than just mining, though!
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714008401
Hero Member
*
Offline Offline

Posts: 1714008401

View Profile Personal Message (Offline)

Ignore
1714008401
Reply with quote  #2

1714008401
Report to moderator
1714008401
Hero Member
*
Offline Offline

Posts: 1714008401

View Profile Personal Message (Offline)

Ignore
1714008401
Reply with quote  #2

1714008401
Report to moderator
1714008401
Hero Member
*
Offline Offline

Posts: 1714008401

View Profile Personal Message (Offline)

Ignore
1714008401
Reply with quote  #2

1714008401
Report to moderator
Puppet
Legendary
*
Offline Offline

Activity: 980
Merit: 1040


View Profile
September 28, 2013, 08:54:00 PM
 #22

But was the R&D financed by NSA or something like that, or are they spending millions for easy remote tech support?

Vpro undeniably has legitimate uses. The problem is one only needs the keys to sign the code to be executed by the vpro chipset to gain absolute and total control over the machine. What are the odds the NSA has not gotten or obtained those keys from intel? Moreover, you may not even need those keys. Many versions of vpro have already been hacked. Google for "Invisible Things Lab".
b!z
Legendary
*
Offline Offline

Activity: 1582
Merit: 1010



View Profile
September 29, 2013, 03:05:10 AM
 #23

Well you can just not use that processor.
Wipeout2097
Sr. Member
****
Offline Offline

Activity: 840
Merit: 255


SportsIcon - Connect With Your Sports Heroes


View Profile
September 29, 2013, 07:40:17 AM
 #24

Yes, you can disable vPro. When you are using the machine, use an USB-Ethernet or USB Wifi adapter. When you are not using it, unplug it from the wall.

That said, I don't understand why you would buy such a machine in the first place. Those are for business environments and are more expensive.

███████████████████████████████████████████████████████████████
██▀       ▀█       ▀████████████        ▀█         █▀       ▀██
██   ▀██▄▄▄█   ██   ████████████   ███   ████   ████   ▀██▄▄▄██
███▄     ▀██       ▄████████████       ▄█████   █████▄     ▀███
██▀▀▀██▄   █   █████████████████   █▄  ▀█████   ████▀▀▀██▄   ██
██▄       ▄█   █████████████████   ██▄  ▀████   ████▄       ▄██
███████████████████████████████████████████████████████████████
██       ██▀      ▀█████████████    ▀██   █████████████████████
████   ███   ▄██▄   ████████████     ▀█   █████████████████████
████   ███   ████████   ████   █   ▄  ▀   █████████████████████
████   ███   ▀██▀   █   ████   █   █▄     █████████████████████
██       ██▄      ▄███        ██   ██▄    █████████████████████
███████████████████████████████████████████████████████████████
██████████████
██
██
██
██
██
██
██
██
██
██
██
██████████████
████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████                                                             ████████████████████████████████████████████████
.
.
.

████████████████████████████████████████████████████████████          ████████████████                                 ██████████████████████████████████████████████████████████████████████████████████████
██████████████
██
██
██
██
██
██
██
██
██
██
██
██████████████
███████
██
██
██
██
██
██
██
██
██
██
██
███████
███████
██
██
██
██
██
██
██
██
██
██
██
███████
►►  Powered by
BOUNTY
DETECTIVE
Meizirkki
Hero Member
*****
Offline Offline

Activity: 616
Merit: 500



View Profile
September 29, 2013, 02:41:00 PM
 #25

That said, I don't understand why you would buy such a machine in the first place. Those are for business environments and are more expensive.
They are durable and you get them for cheap when company buys new computers and dumps the old ones.
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
September 29, 2013, 03:57:09 PM
 #26

Ever since reading The Cold Cash War many years ago I've tended to figure this kind of stuff was coming. That they actually talk about it outside of classified documents nowadays might mean its been around a lot longer than you might think and might be in a lot of chips you might not expect stuff like that to be in...

-MarkM-


if thats true this could be very very bad for bitcoin. maybe its time to start thinking about and talking about open source hardware, or what ever is the nearest thing to it?

The real issue is Intel's SGX. Software Guard Extensions basically means you don't have control over your computer anymore. It means that unless you reverse-engineer the processor itself, you can make malware that is impossible to analyze -- a dream for an entity like the NSA. Additionally, Intel could easily be forced to hand over the private keys used by SGX, allowing the NSA to bypass it. Even if the processor was entirely open source, and you verified that an off-the-shelf processor exactly matched the open source specification transistor for transistor, you STILL wouldn't be able to prove Intel backdoored SGX, because all it takes is knowledge of the private key.

No.

This is all true, if SGX turns out to be everything Intel says it will be. And it only causes an issue if your OS hasn't been re-engineered with the new instructions in mind. And if OS design properly leverages the capabilities of SGX, you could end up with a more secure machine/system than there's ever been. So it's more appropriate to say that this is potentially a very sharp double edged sword type affair, not "Intel engineers the most insidious backdoor ever".

Vires in numeris
Puppet
Legendary
*
Offline Offline

Activity: 980
Merit: 1040


View Profile
September 30, 2013, 06:10:27 AM
 #27

Gotta wonder if intel buying mcafee a few years ago has anything to do with this. Never quite understood why intel wanted mcafee, and so badly they paid almost $8B for it, ~3x AMD's market cap.
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
September 30, 2013, 01:23:01 PM
 #28

Ever since reading The Cold Cash War many years ago I've tended to figure this kind of stuff was coming. That they actually talk about it outside of classified documents nowadays might mean its been around a lot longer than you might think and might be in a lot of chips you might not expect stuff like that to be in...

-MarkM-


if thats true this could be very very bad for bitcoin. maybe its time to start thinking about and talking about open source hardware, or what ever is the nearest thing to it?

The real issue is Intel's SGX. Software Guard Extensions basically means you don't have control over your computer anymore. It means that unless you reverse-engineer the processor itself, you can make malware that is impossible to analyze -- a dream for an entity like the NSA. Additionally, Intel could easily be forced to hand over the private keys used by SGX, allowing the NSA to bypass it. Even if the processor was entirely open source, and you verified that an off-the-shelf processor exactly matched the open source specification transistor for transistor, you STILL wouldn't be able to prove Intel backdoored SGX, because all it takes is knowledge of the private key.

No.

This is all true, if SGX turns out to be everything Intel says it will be. And it only causes an issue if your OS hasn't been re-engineered with the new instructions in mind. And if OS design properly leverages the capabilities of SGX, you could end up with a more secure machine/system than there's ever been. So it's more appropriate to say that this is potentially a very sharp double edged sword type affair, not "Intel engineers the most insidious backdoor ever".

No, even if your OS has been re-engineered to take advantage of SGX, you're still fucked. You'll end up with a more secure system against some adversaries, but it's really a false sense of security since you'll be at the mercy of anyone with the private keys (Intel), and anyone who can force Intel to hand over the private keys (the US Government). Plus, you can still make malware that's impossible to reverse engineer under SGX, making antivirus programs useless.

Again: No.

That's not how the SGX model is said to work, that's the (admittedly possible) tin-foil hat version. But Intel aren't going to sell processors to which only they have the private key to run enclaved code, and more to the point, consumers won't buy them. What sort of a "feature" would that even be? Intel could use much more insidious ways to back-door their processors.

Vires in numeris
Anon136 (OP)
Legendary
*
Offline Offline

Activity: 1722
Merit: 1217



View Profile
September 30, 2013, 04:02:35 PM
 #29

Ever since reading The Cold Cash War many years ago I've tended to figure this kind of stuff was coming. That they actually talk about it outside of classified documents nowadays might mean its been around a lot longer than you might think and might be in a lot of chips you might not expect stuff like that to be in...

-MarkM-


if thats true this could be very very bad for bitcoin. maybe its time to start thinking about and talking about open source hardware, or what ever is the nearest thing to it?

The real issue is Intel's SGX. Software Guard Extensions basically means you don't have control over your computer anymore. It means that unless you reverse-engineer the processor itself, you can make malware that is impossible to analyze -- a dream for an entity like the NSA. Additionally, Intel could easily be forced to hand over the private keys used by SGX, allowing the NSA to bypass it. Even if the processor was entirely open source, and you verified that an off-the-shelf processor exactly matched the open source specification transistor for transistor, you STILL wouldn't be able to prove Intel backdoored SGX, because all it takes is knowledge of the private key.

No.

This is all true, if SGX turns out to be everything Intel says it will be. And it only causes an issue if your OS hasn't been re-engineered with the new instructions in mind. And if OS design properly leverages the capabilities of SGX, you could end up with a more secure machine/system than there's ever been. So it's more appropriate to say that this is potentially a very sharp double edged sword type affair, not "Intel engineers the most insidious backdoor ever".

No, even if your OS has been re-engineered to take advantage of SGX, you're still fucked. You'll end up with a more secure system against some adversaries, but it's really a false sense of security since you'll be at the mercy of anyone with the private keys (Intel), and anyone who can force Intel to hand over the private keys (the US Government). Plus, you can still make malware that's impossible to reverse engineer under SGX, making antivirus programs useless.

Again: No.

That's not how the SGX model is said to work, that's the (admittedly possible) tin-foil hat version. But Intel aren't going to sell processors to which only they have the private key to run enclaved code, and more to the point, consumers won't buy them. What sort of a "feature" would that even be? Intel could use much more insidious ways to back-door their processors.

lets suppose for the sake of discussion that the nsa promised intel all sorts of goodies to hardware backdoor all of their processors. do you think it would be possible for intel to get away with this? is it possible to audit for this sort of thing? is anyone auditing for this sort of thing?

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
September 30, 2013, 04:12:21 PM
 #30

lets suppose for the sake of discussion that the nsa promised intel all sorts of goodies to hardware backdoor all of their processors. do you think it would be possible for intel to get away with this? is it possible to audit for this sort of thing? is anyone auditing for this sort of thing?

From what I've read up on, yes. It's even possible to do this in a plausibly deniable way, hence "insidious" in my previous post. I suspect that it would be unwise to use this sort of exploit on a widespread scale, as it only increases the chances that Intel get bad publicity from having "exploitable flaws" as opposed to deliberate backdoors. I think it's best to assume that all systems at all levels are breakable in one way or another; start all plans to secure your digital stuff with that assumption.

Vires in numeris
Anon136 (OP)
Legendary
*
Offline Offline

Activity: 1722
Merit: 1217



View Profile
September 30, 2013, 04:25:30 PM
Last edit: September 30, 2013, 04:43:02 PM by Anon136
 #31

lets suppose for the sake of discussion that the nsa promised intel all sorts of goodies to hardware backdoor all of their processors. do you think it would be possible for intel to get away with this? is it possible to audit for this sort of thing? is anyone auditing for this sort of thing?

From what I've read up on, yes. It's even possible to do this in a plausibly deniable way, hence "insidious" in my previous post. I suspect that it would be unwise to use this sort of exploit on a widespread scale, as it only increases the chances that Intel get bad publicity from having "exploitable flaws" as opposed to deliberate backdoors. I think it's best to assume that all systems at all levels are breakable in one way or another; start all plans to secure your digital stuff with that assumption.

thats super weird to me. i really need to learn more about computer architecture because i thought processors all performed the same very basic process only some faster than others and some with more parallel instances of that basic process than others.

in-fact im going to go get started on that right now. thanks for the info.

*edit* you know if it seems my assumption was basically right. since it is just a couple of simple processes we are dealing with here, perhaps electronics engineers are adding layers of complexity in-order to achieve marginal gains in performance at the behest of consumers seeking cutting edge performance. perhaps if consumers were more interested in security and were willing to trade some performance for security than fractalen processors could be build that would make security audits easy as pie. i hope this makes sense.

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
behindtext
Full Member
***
Offline Offline

Activity: 121
Merit: 103


View Profile WWW
September 30, 2013, 10:41:27 PM
 #32

howdy justus Smiley

nice to see this thread here since the blog entry that described the potential vulnerability got 'spiked' from reddit in short order a week ago.

secure compute facilities will often house their critical systems inside an EM-isolated room, i.e. faraday cage. considering that it is _very_ difficult to ever know exactly what circuits are live or backdoored, isolating the systems from remote EM signals is a pretty sound practice. this is done to prevent both remote control channels and passive interception from working on machines inside such a room.

intel is surely the recipient of one or more NSLs that state it must publicly deny any such hardware backdoors exist, just like the PRISM collaborators.  even if intel management approved of such an action, they would still want an NSL so they can CYA in the instance they were ever implicated in the planting of backdoors.

the trouble with complex systems, like computers, is that anyone planting a backdoor has a lot of plausible deniability, e.g. "oh wow, i didn't realize that i left that remote update path accessible on this NIC firmware!". the same goes for intel: they can easily claim that "well, we never intended someone to be able to get remote DMA over 3G on your laptop".

unless you've got a proper EM-isolated room and have assurances that you are not vulnerable to remote attacks a la firmware attacks or OS exploits, someone owning your computer is always a possibility. an EM-isolated room or enclosure can be quite expensive and having resistance to firmware attacks is nontrivial.

I feel safer already. Some web site I've never heard of before quotes an unnamed Intel spokesperson who promises that nothing bad is going on.

http://news.techeye.net/chips/intel-responds-to-always-on-3g-processor-conspiracy

Quote
Every Intel vPro CPU ships with an undocumented 3G chip inside, according to a report, which is visible on the 3G network even when a PC is not turned on.

The idea is to enable the Anti Theft 3.0 technology, found on every Core i3, i5 and i7 CPU after Sandy Bridge, meaning almost every new CPU from Intel may have an embedded and hidden 3G connection Intel didn't bother to tell you about, Softpedia reports.

...

An Intel spokesperson, responding to TechEye, said: "First, Intel does not participate in government efforts to decrease security in technology, and does not include backdoors for unauthorised access into its products

"Second, the piece on vPro is based on incorrect information, assumptions and misunderstandings; it is wrong on many levels," the spokesperson said. "The underlying technology is not new and has been in place for more than 7 years."

msc
Sr. Member
****
Offline Offline

Activity: 282
Merit: 250



View Profile
September 30, 2013, 11:16:04 PM
 #33

By the way, who's paying for the 3G service for every one of these processors?  Intel, Verizon, or the NSA?
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
September 30, 2013, 11:27:57 PM
 #34

By the way, who's paying for the 3G service for every one of these processors?  Intel, Verizon, or the NSA?

intel probably has an agreement with 3g providers, similar to how amazon has an agreement to provide 3g to its kindle devices.

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
behindtext
Full Member
***
Offline Offline

Activity: 121
Merit: 103


View Profile WWW
September 30, 2013, 11:32:52 PM
 #35

By the way, who's paying for the 3G service for every one of these processors?  Intel, Verizon, or the NSA?

keep in mind that paid 3G service (via a simcard, etc) only means that you are authorized to communicate with the public internet via a cell tower using a particular frequency. the ability to send and receive on the 3G band only requires that the antenna exist in the hardware.

there is absolutely nothing stopping someone from using a 3g imsi catcher locally, e.g. sitting in a car outside your house or wherever these machines are housed.

Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
September 30, 2013, 11:55:50 PM
 #36

unless you've got a proper EM-isolated room and have assurances that you are not vulnerable to remote attacks a la firmware attacks or OS exploits, someone owning your computer is always a possibility. an EM-isolated room or enclosure can be quite expensive and having resistance to firmware attacks is nontrivial.

So, now we're looking at steel plate rooms to go with our steel plate hats? I'm gonna be entirely candid here: there's a reason, I think, that no processor manufacturer from any country can fill this void with a certifiably snoop-free option, and it's that it's not allowed. No government will allow such a thing to exist, it's bad for business.  Cheesy And so you have to conclude that, despite all the drama played out in the news media, governments from North Korea to the big US all the way to "information freedom fighters" like Iceland are happy with this situation. And if that's true, what's with all the drama, anyway? You'd think they could put on a show that was little more entertaining and not quite so terrifying. Hmmm. Oh, and, call me skeptical.

Vires in numeris
Gavin Andresen
Legendary
*
Offline Offline

Activity: 1652
Merit: 2216


Chief Scientist


View Profile WWW
October 01, 2013, 12:33:33 AM
 #37

so my question is this, if we take everything that is written in this article for granted, would it even be technically possible to secure ones bitcoins on a computer with one of these vPro processors?

Relying on any single piece of hardware to secure your bitcoins is a bad idea. In the future, you should use two pieces of hardware created in two different parts of the world by two different organizations in two different legal jurisdictions to secure your bitcoins.

Right now... "only invest time or money you can afford to lose."

How often do you get the chance to work on a potentially world-changing project?
Anon136 (OP)
Legendary
*
Offline Offline

Activity: 1722
Merit: 1217



View Profile
October 01, 2013, 12:42:03 AM
 #38

so my question is this, if we take everything that is written in this article for granted, would it even be technically possible to secure ones bitcoins on a computer with one of these vPro processors?

Relying on any single piece of hardware to secure your bitcoins is a bad idea. In the future, you should use two pieces of hardware created in two different parts of the world by two different organizations in two different legal jurisdictions to secure your bitcoins.

Right now... "only invest time or money you can afford to lose."


thanks for chiming in Gavin. that sounds like very good advise to me.

also you must be able to afford to lose a lot of time seeing as how much you have invested in this project so far Grin

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
October 01, 2013, 01:11:24 AM
 #39

so my question is this, if we take everything that is written in this article for granted, would it even be technically possible to secure ones bitcoins on a computer with one of these vPro processors?

Relying on any single piece of hardware to secure your bitcoins is a bad idea. In the future, you should use two pieces of hardware created in two different parts of the world by two different organizations in two different legal jurisdictions to secure your bitcoins.

Right now... "only invest time or money you can afford to lose."


thanks for chiming in Gavin. that sounds like very good advise to me.

also you must be able to afford to lose a lot of time seeing as how much you have invested in this project so far Grin

Gavin gets paid for working full time on Bitcoin, I would guess he's being compensated well enough that his finances haven't become totally uncomfortable (although I suspect he's also not being paid well enough either, but I won't speculate further as it's tantamount to expecting some kind of clarification).

I agree with the sentiments about diversifying the hardware you rely on, but I would go one step further. As an early example in the field, I think the guys at Trezor are best placed of all hardware producers to come up with something that's difficult for government agencies or (private sector) criminals to exploit. The Trezor people have a truly believable motivation to create secure devices, no matter the scenario, no matter how cynical you are. You can't say the same thing for computer hardware manufacturers in general, and in my true-cynic's view, assuming that separate legal jurisdictions have genuinely separate allegiances might not be such a logical assumption to rely on. You can trust slush and stick's motivations better than you can other hardware producers. This doesn't mean they can't produce a fallible design, but they're the least likely to come up with something that has intentional flaws.

Vires in numeris
Anon136 (OP)
Legendary
*
Offline Offline

Activity: 1722
Merit: 1217



View Profile
October 01, 2013, 01:15:37 AM
 #40

so my question is this, if we take everything that is written in this article for granted, would it even be technically possible to secure ones bitcoins on a computer with one of these vPro processors?

Relying on any single piece of hardware to secure your bitcoins is a bad idea. In the future, you should use two pieces of hardware created in two different parts of the world by two different organizations in two different legal jurisdictions to secure your bitcoins.

Right now... "only invest time or money you can afford to lose."


thanks for chiming in Gavin. that sounds like very good advise to me.

also you must be able to afford to lose a lot of time seeing as how much you have invested in this project so far Grin

Gavin gets paid for working full time on Bitcoin, I would guess he's being compensated well enough that his finances haven't become totally uncomfortable (although I suspect he's also not being paid well enough either, but I won't speculate further as it's tantamount to expecting some kind of clarification).

i know i was just messing around.

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
Pages: « 1 [2] 3 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!