All AMD Processors Since Phenom II Have BadBIOS Circuitry That Leaks to the Military

  • 🔧 At about Midnight EST I am going to completely fuck up the site trying to fix something.

Exsosym

kiwifarms.net
Joined
Nov 27, 2017
Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer.

The same way AMD was able to change the crypto algorithms for the Zen chip they licensed to China, they can change how the CPU behaves at any system, even those already deployed. This can also be used to sabotage any program or computation, making BadBIOS (uses radio, not sound) vastly nastier than Stuxnet.

American military made a grave mistake to partner with the morons of the Brazilian military, who are letting knowledge of this spread like a fire (and misusing it for petty profit and inside jobs to justify a police state). Israel, UK and France also have access, but are much more professional.
 
BadBIOS is a 7 year old theoretical malware concept, and myth in the real world, until you can prove it exists. Also, the Phenom II predates the concept by five years, and while that doesn't prove anything on its own, it does suggest that your story isn't 100% straight. Take your fuckin' meds. Also, considering that AMD used the same 10h Architecture for the original Phenom, why would those be unaffected?

You can't replace Terry. He was too good for this world.
 
Do you still think it's the 90's? Times have changed and intel fucking sucks now.
I was actually considering putting a check in my software that checks if it's running on an Intel CPU and logging "WARNING: YOU ARE ON A COMPROMISED PLATFORM, NO SAFETY CAN BE GUARENTEED" or something, half as a legal measure and mostly as a jeer at Intel's totally non-existent quality control department.
 
A = American
M = Military
D = Dinosaurs

Wake up, sheeple.
I want to be awake
dinoriders.png
 
Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer.

The same way AMD was able to change the crypto algorithms for the Zen chip they licensed to China, they can change how the CPU behaves at any system, even those already deployed. This can also be used to sabotage any program or computation, making BadBIOS (uses radio, not sound) vastly nastier than Stuxnet.

American military made a grave mistake to partner with the morons of the Brazilian military, who are letting knowledge of this spread like a fire (and misusing it for petty profit and inside jobs to justify a police state). Israel, UK and France also have access, but are much more professional.
The problem with these type of conspiracy theories is the simple fact that these three letter agencies have countless Day 0 exploits to use that are much easier to set up than exploiting Intel's ME and AMD's PSP. The path of least resistance is the easiest to take, it's easier to exploit some javascript vulnerability (even in the case where it's supposed to be disabled it can still be exploited, look at the recent Tor Browser bug) rather than setting up an elaborate backdoor like this. Even in a case of a machine having a sufficient enough air gap it is still easier to just get physical access to the machine and plug an external device into it or just straight up take the storage medium out of the machine.

You are right to worry about being snooped on, but at this point you are clearly missing the forest for the trees.
 
Back