rugabunda
New Member
- Joined
- May 22, 2018
- Messages
- 24 (0.01/day)
AMD deleted the following from Reddit; immediately after, Reddit blocked my ability to login. Its called the Talpiot Program. "Tribal chutzpa."
Its been 8 months since Mark Papermaster, Senior Vice President and Chief Technology Officer at AMD has acknowledged hardware level RYZENFALL, FALLOUT, CHIMERA, MASTERKE vulnerabilities, originally exploited by Israel's CTS. AMD's Senior Vice President promised "AMD will provide additional updates on both our analysis of these issues and the related mitigation plans in the coming weeks," well its been 8 months and they opted for a total blackout; 8 months and the greatest chipset level vulnerabilities in AMD's history are apparently spreading freely and openly around the globe. It appears AMD doesn't have any concern for their customers safety, be it corporate, business, or power-users. Such a vulnerability is catastrophic and could result in untold fraud, theft, espionage, you name it. Snowden warned AMD and asked them to opensource PSP for this very reason. They didn't listen:
Read AMD's own public statement and report on these verified vulnerabilities: https://community.amd.com/community...amd-technical-assessment-of-cts-labs-research
There is nothing else to be found on their community forum anywhere.
Problem Description & Method of Exploitation "Attacker who already has compromised the security of a system updates flash to corrupt its contents. AMD Secure Processor (PSP) checks do not detect the corruption. "
Bear in mind:
“In a recent survey it was reported that 90 percent of all businesses suffered some sort of computer hack over the past 12 months and 77 percent of these companies felt that they were successfully attacked several times over the same period of time.”
https://stellarbluetechnologies.com/2015/08/4-scary-hacking-statistics/
A 10 year old could pull this off.
Evidence Suggests Report on AMD Security Was Financially Motivated
https://wccftech.com/report-alleges-amd-ryzen-epyc-cpus-suffer-13-fatal-security-flaws/
These are hardware level exploits that remain persistent after windows reinstall, format etc.
Its been 8 months since Mark Papermaster, Senior Vice President and Chief Technology Officer at AMD has acknowledged hardware level RYZENFALL, FALLOUT, CHIMERA, MASTERKE vulnerabilities, originally exploited by Israel's CTS. AMD's Senior Vice President promised "AMD will provide additional updates on both our analysis of these issues and the related mitigation plans in the coming weeks," well its been 8 months and they opted for a total blackout; 8 months and the greatest chipset level vulnerabilities in AMD's history are apparently spreading freely and openly around the globe. It appears AMD doesn't have any concern for their customers safety, be it corporate, business, or power-users. Such a vulnerability is catastrophic and could result in untold fraud, theft, espionage, you name it. Snowden warned AMD and asked them to opensource PSP for this very reason. They didn't listen:
Read AMD's own public statement and report on these verified vulnerabilities: https://community.amd.com/community...amd-technical-assessment-of-cts-labs-research
There is nothing else to be found on their community forum anywhere.
Problem Description & Method of Exploitation "Attacker who already has compromised the security of a system updates flash to corrupt its contents. AMD Secure Processor (PSP) checks do not detect the corruption. "
Bear in mind:
“In a recent survey it was reported that 90 percent of all businesses suffered some sort of computer hack over the past 12 months and 77 percent of these companies felt that they were successfully attacked several times over the same period of time.”
https://stellarbluetechnologies.com/2015/08/4-scary-hacking-statistics/
A 10 year old could pull this off.
Evidence Suggests Report on AMD Security Was Financially Motivated
https://wccftech.com/report-alleges-amd-ryzen-epyc-cpus-suffer-13-fatal-security-flaws/
These are hardware level exploits that remain persistent after windows reinstall, format etc.
Last edited: