TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Chip Red Pill: Arbitrary [Micro]Code Execution Inside Intel Atom CPUs

189 pointsby blopeurover 3 years ago

6 comments

lr1970over 3 years ago
One of the authors of the posted article Dmitry Sklyarov of the &quot;United States vs. ElcomSoft and Dmitry Sklyarov&quot; fame [0] was arrested by the FBI in 2001 for giving a talk at the DEF CON exposing the weaknesses in the Adobe e-book copy protection. After spending time in federal detention Dmitry was released and returned to Russia. The charges against him were dropped.<p>[0] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;United_States_v._Elcom_Ltd" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;United_States_v._Elcom_Ltd</a>.
评论 #30249897 未加载
评论 #30247652 未加载
blopeurover 3 years ago
Chip Red Pill Repos : <a href="https:&#x2F;&#x2F;github.com&#x2F;chip-red-pill" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;chip-red-pill</a><p>Tool : <a href="https:&#x2F;&#x2F;github.com&#x2F;chip-red-pill&#x2F;udbgInstr" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;chip-red-pill&#x2F;udbgInstr</a><p>Undocumented x86 insts for uarch control : <a href="https:&#x2F;&#x2F;github.com&#x2F;chip-red-pill&#x2F;udbgInstr&#x2F;blob&#x2F;main&#x2F;paper&#x2F;undocumented_x86_insts_for_uarch_control.pdf" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;chip-red-pill&#x2F;udbgInstr&#x2F;blob&#x2F;main&#x2F;paper&#x2F;u...</a>
评论 #30255815 未加载
评论 #30251476 未加载
xelxebarover 3 years ago
&gt; All the modern Intel CUPs have a RISC core inside..<p>This reminds of (yet another) mind-blowing Chris Domas video: <a href="https:&#x2F;&#x2F;invidious.snopyta.org&#x2F;watch?v=jmTwlEh8L7g" rel="nofollow">https:&#x2F;&#x2F;invidious.snopyta.org&#x2F;watch?v=jmTwlEh8L7g</a>
评论 #30243751 未加载
评论 #30246322 未加载
评论 #30243764 未加载
评论 #30243615 未加载
评论 #30246116 未加载
rocketChairover 3 years ago
It&#x27;s getting increasingly difficult to trust American-designed chips and systems for me at this point... and I can&#x27;t help but feeling that people paid way, way too little attention to everything we learned from the NSA and CIA leaks a few years back.
评论 #30245521 未加载
评论 #30246185 未加载
评论 #30245143 未加载
alexb_over 3 years ago
A lot of their claims sound very scary but I don&#x27;t really know what to make of this as an average user. Is there an explanation to what this stuff means for me? What security vulnerabilities does this allow for on Intel CPUs? Are they worth worrying about? On a scale of &quot;minor bug&quot; to &quot;every single intel chip is easily able to run arbitrary code and is vulnerable on a hardware level&quot; how bad is this exactly?
评论 #30243276 未加载
评论 #30243273 未加载
评论 #30246834 未加载
评论 #30243635 未加载
kevincoxover 3 years ago
That&#x27;s a really asshole cookie banner. It looks like only essential cookies are checked, but the big red button accepts all cookies, ignoring the selection. You need to careful read and select the second button to only accept the selected cookies.
评论 #30244506 未加载
评论 #30246553 未加载
评论 #30244549 未加载
评论 #30247355 未加载
评论 #30243958 未加载
评论 #30244030 未加载
评论 #30244141 未加载