NoGoolag
4.53K subscribers
13.1K photos
6.88K videos
584 files
14.1K links
Download Telegram
Forwarded from Confidential and Proprietary (join from @exconfidential)
#Intel exconfidential Lake Platform ;)

This is the first 20gb release in a series of large Intel leaks.

Most of the things here have NOT been published ANYWHERE before and are classified as confidential, under NDA or Intel Restricted Secret. They were given to me by an Anonymous Source who breached them earlier this Year, more details about this will be published soon.

Some of the contents of this first release:
- Intel ME Bringup guides + (flash) tooling + samples for various platforms
- Kabylake (Purley Platform) BIOS Reference Code and Sample Code + Initialization code (some of it as exported git repos with full history)
- Intel CEFDK (Consumer Electronics Firmware Development Kit (Bootloader stuff)) SOURCES
- Silicon / FSP source code packages for various platforms
- Various Intel Development and Debugging Tools
- Simics Simulation for Rocket Lake S and potentially other platforms
- Various roadmaps and other documents
- Binaries for Camera drivers Intel made for SpaceX
- Schematics, Docs, Tools + Firmware for the unreleased Tiger Lake platform
- (very horrible) Kabylake FDK training videos
- Intel Trace Hub + decoder files for various Intel ME versions
- Elkhart Lake Silicon Reference and Platform Sample Code
- Some Verilog stuff for various Xeon Platforms, unsure what it is exactly.
- Debug BIOS/TXE builds for various Platforms
- Bootguard SDK (encrypted zip)
- Intel Snowridge / Snowfish Process Simulator ADK
- Various schematics
- Intel Marketing Material Templates (InDesign)
- Lots of other things

Make sure to archive/mirror this, as I doubt the original Mega link will survive for long. (Torrent coming soon hopefully)

https://mega.nz/folder/CV91XLBZ#CPSDW-8EWetV7hGhgGd8GQ

torrent: magnet:?xt=urn:btih:38f947ceadf06e6d3ffc2b37b807d7ef80b57f21&dn=Intel%20exconfidential%20Lake%20drop%201
VoltPillager: Researchers Compromise Intel SGX With Hardware-Based Undervolting Attack

Security researchers out of the University of Birmingham have crafted another attack against
Intel Software Guard Extensions (SGX) when having physical motherboard access and using their "VoltPillager" hardware device they assembled for about $30 USD.

Two years ago Plundervolt was widely publicized for compromising Intel's SGX security by manipulating the CPU frequency/voltage as able to through software interfaces. By carefully undervolting the Intel CPUs when executing enclave computations they were able to ultimately compromise the integrity of SGX.

The impact of Plundervolt was already limited as typically the software needs root/administrative rights to access the CPU voltage/frequency MSRs or other kernel interfaces for manipulating them. But in response to Plundervolt, motherboard vendors began offering options to allow disabling voltage/frequency interface controls on their systems. Following Plundervolt, security researchers at the University of Birmingham in the UK began exploring a hardware-based attack on SGX.

https://www.phoronix.com/scan.php?page=news_item&px=VoltPillager-HW-Undervolt

#research #VoltPillager #undervolting #attack #intel #sgx
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
me_cleaner

Python script able to modify an Intel ME firmware image with the final purpose of reducing its ability to interact with the system.

https://github.com/corna/me_cleaner

Intel ME
Intel ME is a co-processor integrated in all post-2006 Intel boards, which is the base hardware for many Intel features like Intel AMT, Intel Boot Guard, Intel PAVP and many others. To provide such features, it requires full access to the system, including memory (through DMA) and network access (transparent to the user).

Unlike many other firmware components, the Intel ME firmware can't be neither disabled nor reimplemented, as it is tightly integrated in the boot process and it is signed.

This poses an issue both to the free firmware implementations like coreboot, which are forced to rely on a proprietary, obscure and always-on blob, and to the privacy-aware users, who are reasonably worried about such firmware, running on the lowest privilege ring on x86.

What can be done
Before Nehalem (ME version 6, 2008/2009) the ME firmware could be removed completely from the flash chip by setting a couple of bits inside the flash descriptor, effectively disabling it.

Starting from Nehalem the Intel ME firmware can't be removed anymore: without a valid firmware the PC shuts off forcefully after 30 minutes, probably as an attempt to enforce the Intel Anti-Theft policies.

However, while Intel ME can't be turned off completely, it is still possible to modify its firmware up to a point where Intel ME is active only during the boot process, effectively disabling it during the normal operation, which is what me_cleaner tries to accomplish.

#intel #me #mecleaner
Forwarded from GJ `°÷°` 🇵🇸🕊 (t ``~__/>)
Arnaud Bertrand (@RnaudBertrand): "Incredible article, basically saying that much of the "intelligence" released these days by the #US is "low-confidence", downright wrong or just designed "to get inside Putin’s head". Remember the old adage: in a war the first casualty is the truth. https://www.nbcnews.com/politics/national-security/us-using-declassified-intel-fight-info-war-russia-even-intel-isnt-rock-rcna23014" | Nitter | PussTheCat.orghttps://nitter.pussthecat.org/RnaudBertrand/status/1511977569691717632#m

It doesn’t have to be solid intelligence,” one U.S. official said. “It’s more important to get out ahead of them [the Russians], Putin specifically, before they do something."

#Ukraine #CIA #EU #Nato
#intel #InfoWar #propaganda
Forwarded from GJ `°÷°` 🇵🇸🕊 (t ``~__/>)
This media is not supported in your browser
VIEW IN TELEGRAM
Former CIA Agent John Stockwell Talks about how the #CIA worked in #Vietnam and elsewhere and explains #Propaganda techniques, fakes with #journalist & #medias

John Stockwell left the CIA when he decided that what they were doing was endangering national security not protecting it.

John R. Stockwell (born 1937) is a former CIA officer who became a critic of United States government policies after serving seven tours of duty over thirteen years. Having managed American involvement in the Angolan Civil War as Chief of the Angola Task Force during its 1975 covert operations, he resigned and wrote "In Search of Enemies".


Better quality video
https://redirect.invidious.io/watch?v=NK1tfkESPVY

#Ukraine #Whistleblower #covert #intel #Stockwell
Forwarded from GJ `°÷°` 🇵🇸🕊 (t ``~__/>)
Re-Roll 2021. .

Inside the Military's Secret Undercover Army – https://www.newsweek.com/exclusive-inside-militarys-secret-undercover-army-1591881

The largest undercover force the world has ever known is the one created by the #Pentagon over the past decade. Some 60,000 people now belong to this secret army, many working under masked identities and in low profile, all part of a broad program called "Signature Reduction." The force, more than ten times the size of the clandestine elements of the #CIA, carries out domestic and foreign assignments, both in military uniforms and under civilian cover, in real life and online, sometimes hiding in private businesses and consultancies, some of them household name companies.

#Ukraine #Intel #Army #US
Forwarded from GJ `°÷°` 🇵🇸🕊 (t ``~__/>)
Orion #Intel (@Orionint): "The war in #Ukraine continuing unabated, NATO and #Swedish #ISR flights near Ukrainian borders have persisted. This map shows #NATO and Swedish ISR activity in Europe from 15th to 28th April 2022." | Nitter | PussTheCat.orghttps://nitter.pussthecat.org/Orionint/status/1520092951401361408#m
#Intel and #AMD Hertzbleed CPU #Vulnerability Uses Boost Speed to Steal Crypto Keys

Intel and researchers from UT Austin, UIUC, and UW published papers today outlining the 'Hertzbleed' chip vulnerability that allows side-channel attacks that can steal secret AES cryptographic keys by observing the CPU's boost frequency/power mechanisms. Both Intel and AMD CPUs are impacted.

The vulnerability impacts all Intel processors and AMD Zen 2 and Zen 3, but it isn't clear if it will impact the upcoming Zen 4 Ryzen 7000.

https://www.tomshardware.com/news/intel-amd-hertzbleed-cpu-vulnerability-boost-clock-speed-steal-crypto-keys
The Former Israeli Spies Working in Top Jobs at Google, Facebook and Microsoft – MintPress - June 2023

AMintPress study has found that hundreds of former agents of the notorious Israeli spying organization, Unit 8200, have attained positions of influence in many of the world’s biggest tech companies, including Google, Facebook, Microsoft and Amazon.

The Israeli Defense Forces’ (IDF) Unit 8200 is infamous for surveilling the indigenous Palestinian population, amassing kompromat on individuals for the purposes of blackmail and extortion. Spying on the world’s rich and famous, Unit 8200 hit the headlines last year, after the Pegasus scandal broke. Former Unit 8200 officers designed and implemented software that spied on tens of thousands of politicians and likely aided in the killing of Saudi journalist Jamal Khashoggi.


#NSO #Pegasus #Israel #Unit8200 #ProjectNimbus #Google #Meta #Facebook #Microsoft #Intel #spyware #surveillance
#Intel ‘Downfall’: Severe flaw in billions of #CPUs leaks passwords and much more

There is a serious security flaw in billions of Intel CPUs that can let attackers steal confidential data like passwords and encryption keys. Firmware updates can fix it, but at a potential significant performance loss.

https://www.pcworld.com/article/2025589/downfall-serious-security-vulnerability-in-billions-of-intel-cpus-how-to-protect-yourself.html

https://downfall.page/


>It only requires the attacker and victim to share the same physical processor core
>only
"if you let us in your house, we might steal your stuff!"

#vulnerability
🇵🇸 U.S. spies have ‘wide range’ of facilities on UK’s Cyprus base near Gaza—and share material ‘daily’ with Israel | Declassified UK

US spies have widespread access to Britain’s bases on Cyprus and share information ‘daily’ with their Israeli counterparts, leaked top secret documents show.

The British so-called Sovereign Base Areas (#SBA) on Cyprus, which comprise 3% of the island’s landmass, sit just 200 miles from #Gaza. The bases are said to be the largest British #intelligence facilities outside of the #UK, although they have never been officially acknowledged.

“Cyprus hosts a wide range of UK and US intelligence facilities”, notes a top secret document from #GCHQ, Britain’s largest spy agency. The document adds: “#Cyprus collection facilities are acknowledged by #NSA as important assets”.

The main US spy agency working on the British territory in Cyprus is the National Security Agency (NSA).

#Palestine #OPT #Intel #WarCrimes #Complicity #Genocide #5Eyes #Nato
04/12/2023