"Scientists have developed a technique to sabotage the cryptographic capabilities included in Intel's Ivy Bridge line of microprocessors. The technique works without being detected by built-in tests or physical inspection of the chip." -
http://arstechnica.com/security/2013/09/researchers-can-slip-an-undetectable-trojan-into-intels-ivy-bridge-cpus/ "The Unbelievable Pressure Artists Are Under to Just Completely Make Some Stuff Up" - https://careersuicideblog.wordpress.com/2013/09/18/the-lies-of-the-artists/ Do read the NSA worker's piece as well as Gilmore's response - http://boingboing.net/2013/09/18/john-gilmore-explains-why-spyi.html China criminalizes viral rumours - http://disinfo.com/2013/09/china-criminalizes-spreading-false-rumors-online-that-go-viral/ The Journal Of Virtual Worlds Research looks at legal and governance issues - http://journals.tdl.org/jvwr/index.php/jvwr _______________________________________________ NetBehaviour mailing list [email protected] http://www.netbehaviour.org/mailman/listinfo/netbehaviour
