[Arm-netbook] TPM backdoor

luke.leighton luke.leighton at gmail.com
Wed Sep 4 17:09:47 BST 2013


On Wed, Sep 4, 2013 at 2:52 PM, Derek <dlahouss at mtu.edu> wrote:

>> I believe TPM uses hidden embedded bluetooth to disclose geolocation of
>> both their UUIDs and data when the computers are offline.
>
> You are entitled to your beliefs.  However, I hope you will listen to reason
> too.  There is no reason to use "hidden bluetooth" for this.

 the reports of overwhelming attack vectors being installed doesn't
"need" a justification or a reason, derek - the purpose of
installation of replacement firmware etc. is intimidation, pure and
simple.

> You are describing a National level of effort, targeted at hassling you.

 basically, yes, she is.  these are the kinds of methods deployed by
criminals and governments.  i'm absolutely astounded that the people
being paid to deploy these attack vectors are even permitted to do so
by their government.  it's a major breach of security as freebirds is
in the unique position of being permitted to document - in public
forums - some extremely sophisticated attack vectors, because the
purpose is HARRASSMENT, *not* espionage.


> Seriously, I doubt anyone would go to this length.

 derek - just to remind you: your "doubt" is a personal belief that
has nothing to do with what freebirds informs us is an extremely
well-funded and long-term method of intimidation.

 in some ways i have to admire this creep, because he's picked a
method of intimidation that _is_ so hard for the average person to
believe.

>  Not even Anonymous would bother this hard.

 anonymous are not funded to attack and harass individuals: a) nobody
bothers to fund them to this extreme level of skill b) i don't believe
it's compatible with anonymous's goals to harass individuals.

l.



More information about the arm-netbook mailing list