Good ideas and conversation. No ads, no tracking. Login or Take a Tour!
Claims were made by the intelligence agencies around the world, from MI5, NSA and IARPA, that silicon chips could be infected. We developed breakthrough silicon chip scanning technology to investigate these claims. We chose an American military chip that is highly secure with sophisticated encryption standard, manufactured in China. Our aim was to perform advanced code breaking and to see if there were any unexpected features on the chip. We scanned the silicon chip in an affordable time and found a previously unknown backdoor inserted by the manufacturer. This backdoor has a key, which we were able to extract. If you use this key you can disable the chip or reprogram it at will, even if locked by the user with their own key. This particular chip is prevalent in many systems from weapons, nuclear power plants to public transport. In other words, this backdoor access could be turned into an advanced Stuxnet weapon to attack potentially millions of systems. The scale and range of possible attacks has huge implications for National Security and public infrastructure.
lessismore · 4566 days ago · link ·
The sky is falling. The sky is falling. But I have a solution. It is cheap and affordable. Fund me. Reads a lot like a sales pitch to me.
lessismore · 4565 days ago · link ·
It turns out that the whole story is bogus. Here is a story debunking it by Robert Graham for Errata Security. I hope mainstream media picks up the story and spread it as far and as wide as the original. Wishful thinking. I know. It is all about the FUD as long as it helps drives the eyeballs.
briandmyers · 4565 days ago · link ·
Meh.
"It's remotely possible that the Chinese manufacturer added the functionality, but highly improbable. It's prohibitively difficult to change a chip design to add functionality of this complexity." http://erratasec.blogspot.co.nz/2012/05/bogus-story-no-chine...