On Sep 19, 2013 2:12 AM, "Rob Myers" <[email protected]> wrote:
>
> "Scientists have developed a technique to sabotage the cryptographic
> capabilities included in Intel's Ivy Bridge line of microprocessors. The
> technique works without being detected by built-in tests or physical
> inspection of the chip." -
>
>
http://arstechnica.com/security/2013/09/researchers-can-slip-an-undetectable-trojan-into-intels-ivy-bridge-cpus/
>
>

presented as scary stuff.  but extremely easy top detect by software. prng
ffs!

> "The Unbelievable Pressure Artists Are Under to Just Completely Make
> Some Stuff Up" -
>
>
https://careersuicideblog.wordpress.com/2013/09/18/the-lies-of-the-artists/
>
>
> Do read the NSA worker's piece as well as Gilmore's response -
>
> http://boingboing.net/2013/09/18/john-gilmore-explains-why-spyi.html
>
>
> China criminalizes viral rumours -
>
>
http://disinfo.com/2013/09/china-criminalizes-spreading-false-rumors-online-that-go-viral/
>
>
> The Journal Of Virtual Worlds Research looks at legal and governance
> issues -
>
> http://journals.tdl.org/jvwr/index.php/jvwr
> _______________________________________________
> NetBehaviour mailing list
> [email protected]
> http://www.netbehaviour.org/mailman/listinfo/netbehaviour
_______________________________________________
NetBehaviour mailing list
[email protected]
http://www.netbehaviour.org/mailman/listinfo/netbehaviour

Reply via email to