Author

Topic: New laptops etc CPU's mother boards (Read 144 times)

legendary
Activity: 3472
Merit: 10611
December 18, 2021, 01:43:47 AM
#6
It depends on the device, a phone or laptop is easy to temper with and install some sort of backdoor and spy hardware to send out personal information but it is not as easy to do the same to desktop computers considering you can buy each part (CPU, MB, RAM, SSD,...) and assemble them yourself.

Additionally when it comes to exploits you have to see what options are available and which one is easier to achieve, costs less and is not going to backfire. For example when a hardware backdoor would damage the reputation of the company and has the potential of bankrupting them. But a software exploit is so much easier and you can never blame the manufacturer or anyone else.
member
Activity: 416
Merit: 30
December 17, 2021, 11:23:01 PM
#5
The motherboard is the basement of your CPU or laptop. So it should be physically strong and compatible with the processor, ram, hard drive, and other hardware, etc. So there is no full stop in the field of technology . If we will not keep ourselves updated with these developments we will be far behind with this world. So new laptops and new mainboard should be replaced regarding new software.
legendary
Activity: 2562
Merit: 1441
March 21, 2021, 06:17:27 PM
#4
Quote
Synaptics driver puts a keylogger on HP laptops

For the second time this year, HP Inc has had to patch its laptops after a security researcher found a driver-level keylogger – and this time, other laptop-makers might have to check their own products.

The debug trace was in the Synaptics Touchpad driver used almost across-the-board in HP laptops, and while it is turned off by default, a registry entry could turn it on. While few home users would be likely to turn it on, it would be a tasty exploit for RAT (remote access trojan) herders.

https://www.theregister.com/2017/12/11/hp_synaptics_keylogger/

HP's security advisory related to this story:  https://support.hp.com/us-en/document/c05827409

....


As an example of this happening in the real world: synaptics touchpad drivers have been known to contain keyloggers for years.

Worse case scenario: system utilities, drivers and libraries may contain keyloggers or backdoors of some type. Windows itself has been known to harvest user data as far back as windows 98. There was an old index.dat file many would periodically open, clear and save to erase collection of end user data. I would have to guess the amount of data today's distros log are far more comprehensive and detailed.

Long story short: windows is known to collect and log user data as far back as 1997. Maybe its time to switch to linux? If only linux had better gaming support. Confirmed backdoors have been found in many things ranging from routers to smartphones. Even supposedly secure crypto hardware wallets have been found to have them.
legendary
Activity: 3234
Merit: 5637
Blackjack.fun-Free Raffle-Join&Win $50🎲
March 19, 2021, 08:43:58 AM
#3
If we remember how the Chinese allegedly spied on the whole world for years by installing spy chips on the hardware they produced, then it's not impossible for such things to happen to personal computers - perhaps even without the manufacturer being directly involved. Such things are difficult to detect, especially for an ordinary customer who is not even allowed to open the device because they will lose the warranty.

Gathering information is a very lucrative business today, and when large hardware manufacturers [1] leave such vulnerabilities in their chips, we need to ask ourselves whether it is possible that this is something they did not know about, or that they did it on purpose all the time?

The only thing that makes sense when it comes to cryptocurrencies and larger amounts of coins are real cold wallets (airgapped devices), or hardware wallets - although they are also full of vulnerabilities and should not be considered the ultimate solution for crypto security problems.

[1] How a researcher hacked his own computer and found 'worst' chip flaw
hero member
Activity: 1218
Merit: 513
March 19, 2021, 08:14:00 AM
#2

On the hardware level? I don't think so, especially on a corporate level.

On the software level? 100% every second trojan tries to access private keys and everything else with even a tiny value.
legendary
Activity: 2632
Merit: 1023
March 19, 2021, 03:43:41 AM
#1
At this point do you think the incentive is large enough so someone in the supply chain has included in hardware, eg in Apple silicon or similar that looks for and sends crypto-sensitive info back?

eg screenshots, privkeys, passwords to unlock encrypted wallets, keystrokes, copy buffer or something.


Eg even if you turn the wifi off it stores keystrokes and compy buffers are stored and set or similar.


Or it is written to a USB that you plug and that usb broadcasts when it has a chance. Eg, the same supply chain provides borh.


is a solution to use a pi and tails? or similar.
Jump to: