Re: Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps
naive perhaps, though would it be possible to transmit such 'radio code' via a small transmitter, say at short range in another building, that could send a stream of infecting code into a building (and thus the infection could begin outside the USB framework), such as via a small programmed microcontroller with radio antenna, either networked or running autonomously (or would this be a pirate radio issue, closed-in on quickly by HAMs monitoring misuse of spectrum). further, if this radio broadcast of code were possible, one-way or bidirectional, what would prevent this from scaling city or region wide if a transmitter were overtaken and sending out signals to computers en masse, to reprogram firmware, targeting via equipment statistics or OS/hardware demographics. just wondering if software-defined radio may be a context for hacking computers beyond the peripherals directly attached to the computers, such that a different security situation, boundary, or perimeter may exist yet not be accounted for or protected against.
________________________________ From: brian carroll <electromagnetize@gmail.com>
naive perhaps, though would it be possible to transmit such 'radio code' via a small transmitter, say at short range in another building, that could send a stream of infecting code into a building (and thus the infection could begin outside the USB framework), such as via a small programmed microcontroller with radio antenna, either networked or running autonomously (or would this be a pirate radio issue, closed-in on quickly by HAMs monitoring misuse of spectrum).
further, if this radio broadcast of code were possible, one-way or bidirectional, what would prevent this from scaling city or region wide if a transmitter were overtaken and sending out signals to computers en masse, to reprogram firmware, targeting via equipment statistics or OS/hardware demographics.
It has been about 31 years since I worked at Intel; at the time they were developing the first DRAMs with 'redundancy': The ability to swap out 'rows' and 'columns', or potentially blocks, of storage elements. This was done to be able to drastically increase the yield of such chips: Test programs were written to identify errors (single bits; bad rows; bad columns; bad blocks) and swap out with 'invisible' rows/columns/blocks with others. Presumably, modern flash ROM has long used similar abilities. If that is the case, there is some kind of ordinarily-invisible storage areas (blocks, most likely) in those flash-drives. Such areas were sometimes 'activated' (made to appear/disappear) by out-of-spec voltages (above +5 volts), but it's possible also that reading or 'writing' combinations of pre-specified data would also do this. It's been too long for me to give detailed assistance, but I can well imagine that 'they' are taking advantage of such 'features'. Jim Bell
On Thu, Oct 31, 2013 at 11:44 PM, Jim Bell <jamesdbell8@yahoo.com> wrote:
... It has been about 31 years since I worked at Intel; at the time they were developing the first DRAMs with 'redundancy': The ability to swap out 'rows' and 'columns', or potentially blocks, of storage elements. This was done to be able to drastically increase the yield of such chips: Test programs were written to identify errors (single bits; bad rows; bad columns; bad blocks) and swap out with 'invisible' rows/columns/blocks with others. Presumably, modern flash ROM has long used similar abilities. If that is the case, there is some kind of ordinarily-invisible storage areas (blocks, most likely) in those flash-drives. Such areas were sometimes 'activated' (made to appear/disappear) by out-of-spec voltages (above +5 volts), but it's possible also that reading or 'writing' combinations of pre-specified data would also do this. It's been too long for me to give detailed assistance, but I can well imagine that 'they' are taking advantage of such 'features'.
Intel would be a strange beast for you today Jim. there's a secret underground facility in Oregon (perhaps Cali too) for classified intelligence work. some small fraction of Intel employees even know it exists. (maybe i'll post GPS coords?) there they sequester CPU vulnerability research of sufficient implication. there they sequester hardware level exploitation research of sufficient implication. there they work on TS/SCI compartmented projects for USGOV. these people do not have your best interests at heart! whatever justifications they hoid dear and true are facades for compliance. sooner or later this will come to light, and it is incredibly disheartening to see loyalty twisted toward state power under guise of social good and justice. make no mistake: these efforts are a direct affront to freedom, liberty, and other ideals we hold paramount. NO MORE SECRETS
________________________________ From: coderman <coderman@gmail.com>
It has been about 31 years since I worked at Intel; at the time they were developing the first DRAMs with 'redundancy': The ability to swap out 'rows' and 'columns', or potentially blocks, of storage elements. This was done to be able to drastically increase the yield of such chips: Test programs were written to identify errors (single bits; bad rows; bad columns; bad blocks) and swap out with 'invisible' rows/columns/blocks with others. Presumably, modern flash ROM has long used similar abilities. If that is the case, there is some kind of ordinarily-invisible storage areas (blocks, most likely) in those flash-drives. Such areas were sometimes 'activated' (made to appear/disappear) by out-of-spec voltages (above +5 volts), but it's possible also that reading or 'writing' combinations of pre-specified data would also do this. It's been too long for me to give detailed assistance, but I can well imagine that 'they' are taking advantage of such 'features'.
Intel would be a strange beast for you today Jim.
When I started work at Intel in early July 1980, Intel was somewhat of a backwater of the semiconductor manufacturing companies. It had about 15,000 employees, and it was best known for EPROMs, high-speed static RAMs, and 5-volt-only DRAMs. (I was hired as a product engineer for a 'pseudostatic' (self-refreshing DRAM) labelled the 2186 (8K by 8), which had fuse-driven redundancy). It was about this time that the 8088 microprocessor was chosen by IBM to run their IBM PC (A big mistake: I thought the 8086/88 and its 'segmentation' sucked, especially with its puny 64 kilobyte segments, and worse, a 12-bit overlap between the address register and the segment register, limiting the address to 1 megabytes), but the boost to business would not arrive until late 1981 or so. And worse, the 8088, with its 8-bit data bus, was little faster than a Z-80 microprocessor. It's not that choosing the 8086 would have been vastly better, but at least that would have smoothed the transition to 80286 that was done with the IBM AT, since the bus would already have been 16-bit wide.
there's a secret underground facility in Oregon (perhaps Cali too) for classified intelligence work. some small fraction of Intel employees even know it exists. (maybe i'll post GPS coords?)
I never heard of it. But if I knew the GPS, maybe I'd visit... Maybe that's what they did with the set for 'Goonies'.
there they sequester CPU vulnerability research of sufficient implication. there they sequester hardware level exploitation research of sufficient implication. there they work on TS/SCI compartmented projects for USGOV.
these people do not have your best interests at heart!
I wouldn't be surprised!
participants (3)
-
brian carroll
-
coderman
-
Jim Bell