Need advice: intel T2330 dual-core CPU compromised?

[chan] Crypto-Anarchist Federation
Jan 2 11:44

Does this dated CPU have any hardware backdoors for remote access like the more-modern intel vPro CPU series? Intentions are to use an old notebook with that CPU as a red system (airgapped) for cryptographic processing only.

[chan] Crypto-Anarchist Federation
Jan 2 14:05

ALL CPUs from 1993 are backdoored.(INTEL AMD) You can use G5 imac...with POWER PC or any RISK CPU, or Russian ELBRUS. Russians know about Minix from about year 2000.

[chan] Crypto-Anarchist Federation
Jan 2 14:46

When you say from you mean starting from ?

Jan 2 14:49

Would good old MC68000 from ATARI ST/STe or even MC68030 for the good old ATARI TT be compromized too ? Do you have access to a kind of list of all the known trademarks and the year we first discover hardware backdoors (NSA) inside ?

[chan] Crypto-Anarchist Federation
Jan 2 15:03

all processors from the beginning have something like micro operting system but from about 1994- have features like networking and a web server which are obvious why. I know MC68000 and it's there but only for ! improvement of Instruction sets and fixing after production BUGS ! (1979). Microcode (CPU FIX) can be found in all BIOSES/EFIs.

Jan 2 15:10

This is a recurrent topic many people ask here, if you have some good litterature downloadable somewhere, lists of compromized CPU and when, please don't hesitate to share it here. Thank you very much for your contribution.

[chan] Crypto-Anarchist Federation
Jan 2 15:10

MC6800 with '79'8x BIOS is safe... problem is that BIOS FIX can add something also to MC68000. I don't have such a list but we can made it checking old Bioses. Another problem ist that South and North bridge probably also have microcode and can communicate dierctly via internet without CPU. Have anyone ever wondered why a phone number is needed for use "WHATSAPP, SIGNAL" ?

[chan] Crypto-Anarchist Federation
Jan 2 15:39

They say it's to slow down abusive account registrations. The recommendation is to never use YOUR phone number, just *A* phone number that you have access to, and burn it after every job. Most users, however, will choose to use their own phone number for convenience reasons, and the app will do nothing to stop them. This sucks from a UI perspective, but it can be argued that those who don't care about this shit enough to figure it out without external reminders deserve whatever happens to them. For those who do care, this guy will rent you a new mobile number for 3 mBTC to activate your apps: http://smspriv6fynj23u6.onion Tell him I sent you :)

[chan] Crypto-Anarchist Federation
Jan 3 09:41

OP here... I apologize for not being more specific with my previous question, but I already said "airgapped". Will a COMPLETELY OFFLINE operated notebook (no WAN, no LAN, no WLAN/WiFi, no Bluetooth etc.) with this CPU be secure? The question relates to wireless hardware backdoors in more-modern CPUs (Intel vPro series etc.). Side note: We are *NOT* talking about TEMPEST attacks here!

[chan] Crypto-Anarchist Federation

Subject Last Count
Integrated Circuits (ASICs) and FPGA "lab attack" Trojan Detection using IC fingerprinting. Feb 25 11:13 1
Tor / Proxychains is leaking my hostname Feb 23 08:31 3
@S3 ... SPOOQKE ... Secure Pair Orthogonal OTP Quantum Key Exchange Feb 22 14:04 2
Compress Random Data Feb 19 06:34 5
Your Mama 1$ §çÛM Feb 18 20:58 1
A satellite engineer explains the truth about satellite operations Feb 18 18:16 3
Satellites Are Fake - Just Another NASA Hoax Feb 18 17:27 1
Globewashing Feb 18 07:37 1
how to make bitmessage secure Feb 18 04:59 1
Are you blacklisted? Feb 18 01:49 1
Mitigating exploited software with firejail Feb 18 01:45 1
MeinCoin Crypto Research - Screenshot Feb 17 13:16 1
Constant Conflict - First published From Parameters, Summer 1997, pp. 4-14: US Army War College] Feb 17 08:28 3
FPGA Hardware backdoors news. Feb 17 08:21 1
Consider this problem. Feb 17 07:10 1
How many users have bitmessage in the world? Feb 16 20:25 2
test 44 Feb 16 19:14 5
$ cd PyBitmessage ; git log | grep Author | sort -u | blacklist Feb 16 03:08 1
Bitmessage components security seclusion example Feb 16 01:05 1
NOTICE: Address Revocation Feb 15 02:49 1
Truly, truly, Bitcoin is a failure Feb 13 12:22 1
Proof of Work is the worst way to do a BlockChain Feb 13 12:10 1
privacy software / services list Feb 11 19:18 5
If I use P2P networks like eMule on the Whonix operating system, is it possible for them to leak my real IP address? Feb 10 08:06 2
hacker for hire Feb 10 02:26 1
a Feb 9 21:21 1
z Feb 9 21:21 1
test1 Feb 9 20:25 3
ZRe: test5 Feb 9 12:51 1
aRe: test5 Feb 9 12:51 1
my pleasure Feb 8 17:06 1
Anonymous VCS Feb 6 15:13 5
The best descriptions of trolls and idiots Feb 6 12:57 2
crypto question Feb 6 12:39 1
since leaving general chan Feb 6 12:16 3
Help Fight Government Tyranny Feb 6 02:04 1
[chan] 411 BM-2cW53MzWqtod8TA6vybdUeqd2LhTuXCX3L Feb 5 11:53 1
Crypto-Anarchist Literature Feb 4 11:19 1
Help needed with identying crypto paper Feb 1 12:25 1
OMEGA user survey Feb 1 03:34 2
What is secure? Jan 29 05:15 14
An Inside Job: Remote Power Analysis Attacks on FPGAs Jan 29 00:02 1