Re: The Libertarian As Conservative
On 3/28/19 8:12 PM, Punk wrote: > On Wed, 27 Mar 2019 19:27:34 -0400 > Steve Kinney wrote: > > >> >> Fake Libertarians seem to play a large part in this dialogue. >> >> Would you care to describe the difference between Fake and Real >> Libertarians, as you apply these terms? >> >> Until then we can only guess... > > I think I gave more than a few hints, but for completness' sake : fake > libertarians support, among other things : > > 1) big business > 2) theocracy > 3) censorship > 4) the 'minimal' or 'limited' state > 5) imperialism - see ayn rand's 'philosophy' of ethnic cleansing > 6) 'voluntary' slavery - see walter block > 7) feminazism > 8) 'social conservatism' > 9) 'voluntary' authoritarianism > > > That's off the top of my head. There prolly is more stuff I'm > forgetting. As to true or actual libertarians, they would oppose all of that. So in short, Anarchists can call themselves Real Libertarians, but nobody else meets the standard. :o) signature.asc Description: OpenPGP digital signature
Intel's VISA ME Debugging Architecture Exploit
https://www.zdnet.com/article/researchers-discover-and-abuse-new-undocumented-feature-in-intel-chipsets/ https://www.intel.com/content/www/us/en/support/articles/25619/software.html https://www.blackhat.com/asia-19/briefings/schedule/#intel-visa-through-the-rabbit-hole-13513 At the Black Hat Asia 2019 security conference, security researchers from Positive Technologies disclosed the existence of a previously unknown and undocumented feature in Intel chipsets. Called Intel Visualization of Internal Signals Architecture (Intel VISA), Positive Technologies researchers Maxim Goryachy and Mark Ermolov said this is a new utility included in modern Intel chipsets to help with testing and debugging on manufacturing lines. VISA is included with Platform Controller Hub (PCH) chipsets part of modern Intel CPUs and works like a full-fledged logic signal analyzer. According to the two researchers, VISA intercepts electronic signals sent from internal buses and peripherals (display, keyboard, and webcam) to the PCH -- and later the main CPU. Unauthorized access to the VISA feature would allow a threat actor to intercept data from the computer memory and create spyware that works at the lowest possible level. But despite its extremely intrusive nature, very little is known about this new technology.
Re: [tor-talk] Is there a way to use internet in a sandbox environment? (Linux)
> Search "BasUSB" typo, "BadUSB".
Re: [tor-talk] Is there a way to use internet in a sandbox environment? (Linux)
On 3/29/19, npdflr wrote: > I am giving a scenario: (Devices: PC Hard Disk having important files for > offline use, USB Device for data transfer and Mobile Device which has > internet connection) > > 1. I have a hard disk that is offline (Linux OS). > 2. I use a mobile device for internet, gather some data and transfer that to > a usb device (via OTG). > 3. I have to mount the usb device to the hard disk since I need the gathered > data. > 4. Give read and write permission to the usb. > 5. I copy the gathered data from usb to the hard disk. Use/process the data > as per needs. > 6. I write some data back to the usb if needed. > 7. Connect usb to the mobile device if needed. > > Data from mobile --> usb --> Hard disk > Data from Hard disk --> usb --> Mobile > > How do I make sure that only the hard disk can read and write to the usb > device and prevent the usb to read/write any hard disk data so that the > files on the hard disk are always safe? Search "BasUSB", "HDDHack", etc. Excepting the direct hardware to hardware hacks that bypass the OS entirely, such as read write address space via hardware interfaces (firewire, pci-usb, etc), the latest memory and cache exploits etc, perhaps put or left in the HW by spies since there are no... #OpenFabs , #OpenHW , #OpenSW , #OpenDev , #OpenBiz , #OpenAudits , etc to help improve and defeat that... Today's kernels still don't provide any sort of storage block device command firmware update opcode filtering that could help prevent implantation of firmware exploits. Many OS still allow unpriviledged users raw access to portable devices. Then filesystem hierarchy access control schemes, and install and boot infrastructures, are also cumbersome or impossible to protect from user, root, or physical level access. To the extent CD-R, DVD-R, and tape "specifications" are just blocks with no firmware being plugged across the gap, and if no "media updates firmware" capabilities, those, or even serial and parallel port transfers, could be more secure than USB. But since it's not open, you never really know. People need to start doing those #Open* things above before they can start to have even the slightest bit of trust in systems.