[tor-talk] possible to identify tor user via hardware DRM?

grarpamp grarpamp at gmail.com
Thu Jun 28 00:46:14 PDT 2012


>> can these chips be used to spying and identifying people

The summary is probably...

Only those with access to the chip masks, or an equally serious
amount of reverse engineering gear, knows what goes into a chipset.
Therefore anything is possible. And if you're not proxying the output
of suspected spy systems through your own masks to validate them,
well... you could very well be screwed :)

The rest is documented stuff you can read in any spec sheet.
Part of that material is indeed new firmware capabilities and
ways to lock it down, or not.

Don't run windows or closed source stuff if you're concerned about
what it might phone home about. UUID's, serials, MAC's, your
data, etc.

If the platform + OS can't be trusted, neither can any app
running on it, including Tor. Act accordingly.

Nothing here related to Tor.... your questions should go to the
author of that post or comp.risks.
_______________________________________________
tor-talk mailing list
tor-talk at lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE





More information about the cypherpunks-legacy mailing list