303
Comments (63)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
2
dankai420 2 points ago +2 / -0

We need an alternative internet, not to mention even processors have backdoors, its hard to have a real safe machine and communication, this verification obsession that these social media have also come at a cost.

3
Normietard [S] 3 points ago +3 / -0

Alot of that stuff is simple scare tactics to scare us into believing that the government can connect to our devices and spy on us at any time. It is nonsense. If it were true then why does the government need to ask people for their passwords when subpoenaing a device? Why don't they just connect to every computer in the world via the backdoor in the processor? If it were true it would be leaked and blackhats would use it for malicious profit. They use it to scare people the same way they used to say the NSA/CIA built back doors into the Encryption algorithm back in the day when they made the boxes in it. Turns out today with modern computing that can better analysis the algorithm, it turns out that they actually hardened the boxes and made them even more secure than previously thought. No back doors.

2
dankai420 2 points ago +2 / -0

No it absolutely is not, all modern Intel processors are buit with a backdoor so intelligence agencies can access it freely, Vault 7 leaks are there, the Weeping Angel program could connect to TV sets, a cellphone, that is a small computer, can 100% be used to monitor, and thats easy to do with the right hardware and software.

1
residue69 1 point ago +1 / -0

Intel, AMD, Huawai, Supermicro, etc. all have "management" backdoors in their various chips and processors.

1
Normietard [S] 1 point ago +1 / -0

Then show me the Hacker or security tester who has tested out the vulnerability and proven it can be done. Until that is proven then it is purely theoretical or actually fake. Just remember Intel agencies and government deliberately leak fake information sometimes. Misinformation is a very powerful tool.

1
dankai420 1 point ago +1 / -0

The whole thing is offline but its obvious that the whole host taking it down might've created vulnerabities, whats more likely in my opinion is that the service itself was hostile towards the company so it helped leak, but thats my uninformed opinion and I might be wrong.