- Joined
- Jan 5, 2006
- Messages
- 16,926 (2.59/day)
System Name | AlderLake / Laptop |
---|---|
Processor | Intel i7 12700K P-Cores @ 5Ghz / Intel i3 7100U |
Motherboard | Gigabyte Z690 Aorus Master / HP 83A3 (U3E1) |
Cooling | Noctua NH-U12A 2 fans + Thermal Grizzly Kryonaut Extreme + 5 case fans / Fan |
Memory | 32GB DDR5 Corsair Dominator Platinum RGB 6000MHz CL36 / 8GB DDR4 HyperX CL13 |
Video Card(s) | MSI RTX 2070 Super Gaming X Trio / Intel HD620 |
Storage | Samsung 980 Pro 1TB + 970 Evo 500GB + 850 Pro 512GB + 860 Evo 1TB x2 / Samsung 256GB M.2 SSD |
Display(s) | 23.8" Dell S2417DG 165Hz G-Sync 1440p / 14" 1080p IPS Glossy |
Case | Be quiet! Silent Base 600 - Window / HP Pavilion |
Audio Device(s) | Panasonic SA-PMX94 / Realtek onboard + B&O speaker system / Harman Kardon Go + Play / Logitech G533 |
Power Supply | Seasonic Focus Plus Gold 750W / Powerbrick |
Mouse | Logitech MX Anywhere 2 Laser wireless / Logitech M330 wireless |
Keyboard | RAPOO E9270P Black 5GHz wireless / HP backlit |
Software | Windows 11 / Windows 10 |
Benchmark Scores | Cinebench R23 (Single Core) 1936 @ stock Cinebench R23 (Multi Core) 23006 @ stock |
A leaker today posted on Twitter a link to a file sharing service that contains what an anonymous source claims is a portion of Intel's crown jewels: A 20GB folder of confidential Intel intellectual property. The leaker dubbed the release the "Intel exconfidential Lake Platform Release
."
Update: Intel has responded to Tom's Hardware with an official statement:
"We are investigating this situation. The information appears to come from the Intel Resource and Design Center, which hosts information for use by our customers, partners and other external parties who have registered for access. We believe an individual with access downloaded and shared this data."
Intel's Resource and Design Center is a website dedicated to providing the company's partners with NDA documentation for product integration purposes. Reports are also cropping up that some of the files are marked with NDA license agreements to "Centerm Information Co. Ltd., a Chinese company established and existing under the laws of the People's Republic of China," meaning this company could have been also hacked.
The folder has been posted by an anonymous source that claims more is coming soon, and while we don't know the exact specifics of the folder's contents, we have verified that it does exist. In fact, the title of many of the documents do correlate to the list of purported information posted by the leaker:
Interestingly, the tweeter also notes "If you find password protected zips in the release the password is probably either "Intel123" or "intel123". This was not set by me or my source, this is how it was acquired from Intel."
The poster encourages downloaders to look for mentions of 'backdoors' in some of the Intel source code, and even provides a sample clip of one such listing, but we aren't sure of the intentions behind the listings in the code.
The link is being widely distributed on Twitter, but it might be best to exercise caution – downloading any file from an untrusted source is always a risk.
www.tomshardware.com

Update: Intel has responded to Tom's Hardware with an official statement:
"We are investigating this situation. The information appears to come from the Intel Resource and Design Center, which hosts information for use by our customers, partners and other external parties who have registered for access. We believe an individual with access downloaded and shared this data."
Intel's Resource and Design Center is a website dedicated to providing the company's partners with NDA documentation for product integration purposes. Reports are also cropping up that some of the files are marked with NDA license agreements to "Centerm Information Co. Ltd., a Chinese company established and existing under the laws of the People's Republic of China," meaning this company could have been also hacked.
The folder has been posted by an anonymous source that claims more is coming soon, and while we don't know the exact specifics of the folder's contents, we have verified that it does exist. In fact, the title of many of the documents do correlate to the list of purported information posted by the leaker:
- Intel ME Bringup guides + (flash) tooling + samples for various platforms
- Kabylake (Purley Platform) BIOS Reference Code and Sample Code + Initialization code (some of it as exported git repos with full history)
- Intel CEFDK (Consumer Electronics Firmware Development Kit (Bootloader stuff)) SOURCES
- Silicon / FSP source code packages for various platforms
- Various Intel Development and Debugging Tools
- Simics Simulation for Rocket Lake S and potentially other platforms
- Various roadmaps and other documents
- Binaries for Camera drivers Intel made for SpaceX
- Schematics, Docs, Tools + Firmware for the unreleased Tiger Lake platform
- (very horrible) Kabylake FDK training videos
- Intel Trace Hub + decoder files for various Intel ME versions
- Elkhart Lake Silicon Reference and Platform Sample Code
- Some Verilog stuff for various Xeon Platforms, unsure what it is exactly.
- Debug BIOS/TXE builds for various Platforms
- Bootguard SDK (encrypted zip)
- Intel Snowridge / Snowfish Process Simulator ADK
- Various schematics
- Intel Marketing Material Templates (InDesign)
- Lots of other things
Interestingly, the tweeter also notes "If you find password protected zips in the release the password is probably either "Intel123" or "intel123". This was not set by me or my source, this is how it was acquired from Intel."
The poster encourages downloaders to look for mentions of 'backdoors' in some of the Intel source code, and even provides a sample clip of one such listing, but we aren't sure of the intentions behind the listings in the code.
The link is being widely distributed on Twitter, but it might be best to exercise caution – downloading any file from an untrusted source is always a risk.

Massive 20GB Intel IP Data Breach Floods the Internet, Mentions Backdoors (Intel Responds)
Anonymous hacker promises more to come soon, too

Last edited: