On Fri, Jul 25, 2014 at 4:54 PM, jwsmobile <jws at jwsss.com> wrote:
I am pretty sure there is no remaining mechanism for
putting in any patches anymore in any production part.
On 7/25/2014 4:28 PM, Eric Smith wrote:
If you're referring to Intel x86 parts, you are
incorrect. The
mechanism is there, and it is routinely used.
On Fri, Jul 25, 2014 at 5:46 PM, jwsmobile <jws at jwsss.com> wrote:
Try to put some code of your own in there. All of
those updates are
encrypted. W/o being Intel and encoding and encrypting updates now you
can't install microcode anymore.
Certainly I didn't claim that I could create a microcode update for
it. But the mechansim IS there, and it IS used. Whether the NSA uses
it is unknown, but it seems foolish to assume that they can't. If
they want to, they'll do it, with or without assistance officially
provided by Intel or AMD.
If you can encrypt and code a patch, then you have
access to internal Intel
tools and documentation I won't even describe to code them.
Or a massive budget for reverse-engineering or espionage. Who do we
know that might have that?
I don't know if
the NSA or others outside Intel could compromise that, but it would require
doing it around the time the chip shipped, not something that could be done
and assumed to be distributed to systems much after that time.
It most certainly can be done after the systems ship. Intel and AMD
created the mechanisms for installing those updates so that the OS can
do it, not just the BIOS, and OSes do in fact do that.
I don't know a lot of people who do chip code
updates, but if they update
their Bios, in my experience it is usually while the system is relatively
new.
But many people update Windows routinely, and it sometimes installs
new microcode updates. So do Linux updates. I'm not sure about Mac
OS X, but I'd guess that it probably does as well.
Should we be trembling in fear and refusing to use computers because
the NSA might be spying on them? No. But should we be aware of the
possibility? Yes.
Eric