Overclock.net › Forums › Intel › Intel CPUs › Warning: Sandy Bridge Hardware Level DRM, Killswitch, & H67 P67 Recalls!
New Posts  All Forums:Forum Nav:

Warning: Sandy Bridge Hardware Level DRM, Killswitch, & H67 P67 Recalls! - Page 38  

post #371 of 484
Thread Starter 
Quote:
Originally Posted by Kmon View Post
You are very funny - but completely confused as from your response do not have much security experience. I like the kill switch ideal but I do not think it is will be effective.

You are assuming "the company" is the only ones going to be able to utilize the kill switch functionality. This is a very big assumption and usually wrong. You are assuming the controls work the way they are design. Experience people realize that controls can be bypass and functionality access in different way then was expected. Just because you think it needs to be activated by a company does not mean it can not be activated by someone else, or by a rogue company employee.

Let think that an employee go rogue and decides to kill the hardware by enabling the kill switch What is the value ofthe lost productivity to the business? Is the lost productivity acceptable? Hmmm are you going to be able to sell that to an executive that is evaluated on uptime? How much is it going to cost to replace? Is the kill switch functionality going to be able to be reverse? If so when the information is leaked or sold, how effective is the kill switch?

A few questions I dont think you thought about?
Clairvoyant comes off as just another intel fan boy, so I don't take his nonsense seriously. To say the killswitch doesn't pose a big security issue is idiotic...

Professionals in the industry have criticized Intel for the killswitch...people with a lot more clout than "Clairvoyant" I assure you.

We all know this is a real problem. Whether you choose to ignore it or accept it is up to you. Your acceptance will only lead to more of this type of built-in hardware DRM however.

And can anyone see the benefit of the killswitch? Your desktop or laptop is stolen, so you activate the killswitch...how does this benefit you? It's not going to lead to getting your chip back. The thief can still remove your hard drive and access the data. The killswitch does not benefit the consumer in reality.
    
CPUGraphicsRAMHard Drive
AMD C-50 1.0ghz ATI 6250 2GB 32GB SSD 
Optical DriveOSPowerCase
External DVDRW Ubuntu / Windows Vista 9 watt AC adapter :\ Acer Tablet 
  hide details  
    
CPUGraphicsRAMHard Drive
AMD C-50 1.0ghz ATI 6250 2GB 32GB SSD 
Optical DriveOSPowerCase
External DVDRW Ubuntu / Windows Vista 9 watt AC adapter :\ Acer Tablet 
  hide details  
post #372 of 484
Quote:
Originally Posted by BigCactus View Post
Clairvoyant comes off as just another intel fan boy, so I don't take his nonsense seriously. To say the killswitch doesn't pose a big security issue is idiotic...

Professionals in the industry have criticized Intel for the killswitch...people with a lot more clout than "Clairvoyant" I assure you.

We all know this is a real problem. Whether you choose to ignore it or accept it is up to you. Your acceptance will only lead to more of this type of built-in hardware DRM however.

And can anyone see the benefit of the killswitch? Your desktop or laptop is stolen, so you activate the killswitch...how does this benefit you? It's not going to lead to getting your chip back. The thief can still remove your hard drive and access the data. The killswitch does not benefit the consumer in reality.
I agree with everything you say but it does present some advantages assuming the cpu is encrypting the data to the drive when written. Yes, it depends upon the encryption effectiveness and the resources being used against the encryption.

Like what was mentioned before, the Killswitch is not a bad ideal for corporate laptops, but its effectiveness I would not rely upon. Companies that deploy this technology are trying to mitgate risk to avoid legal costs. I do understand but it is not an effective solution.

There are risks of misuse, which Clair does not understand.
Edited by Kmon - 1/10/11 at 10:28pm
Gunslinger
(13 items)
 
  
CPUMotherboardGraphicsRAM
1090 MSI 890FXA GD70 5870 Corsair 
Hard DriveOSMonitorPower
C300 Windows I-INC Thermaltake 850 
Case
HAF 932 
  hide details  
Gunslinger
(13 items)
 
  
CPUMotherboardGraphicsRAM
1090 MSI 890FXA GD70 5870 Corsair 
Hard DriveOSMonitorPower
C300 Windows I-INC Thermaltake 850 
Case
HAF 932 
  hide details  
post #373 of 484
Quote:
Originally Posted by Clairvoyant129 View Post
Killswitch has always existed. Have you heard any news of Goldman Sachs or Morgan Stanley's PCs and laptops being shut down due to some hacker hacking their kill switch? Do you know any corporations using vPro (including my company) having problems? No, but even if it did happen you wouldn't know since you're just some high school kid who lives with their mommy. And hackers can't hack your CPU to shut it down since you don't even have a vPro certified 3G wireless card supported by your company. I already know how this works since I'm using it all the time so please stop being a dumbass.

I'll repeat again how this kill switch works,



If anyone is interested read this white paper from Intel,

http://www.intel.com/en_US/Assets/PD...o+antitheft%29

vPro supports anti-theft killswitches and have always existed before Sandy Bridge.
Clair a few things you need to think about

One do you know how cell phones/wireless authenticates? Can you clone a phone? Can you intercept a phone call? Is there a reason why secure miltary communication change frequencies? Is there a way to intercept a kill command or more importantly send one? Is wireless encryption secure? Can you use a graphic card to decrypt or break wireless communciations?

Do you trust the techs? - Do they have gambling or drug problems? Can they be bribed or they pissed about something the company did?

Yes, there are security breaches in those companies. Security breaches are handled very discretely and usually are not made public.

A certain programmer made copies of some trading programs and was stopped before leaving the country with them. You may of heard a little about it but probably not. I wonder what company that individual worked for. I wonder how that information was removed?

The article was a nice read so is Alice in Wonderland. Who published the article? Who pay for the research? Who conducted the research?

Let see the article say the hard drive will not boot with another OS. Was the controller turn off? Can the controller be reenabled? Is the controller tied to a specific value or start code? There are way around those controls.
Gunslinger
(13 items)
 
  
CPUMotherboardGraphicsRAM
1090 MSI 890FXA GD70 5870 Corsair 
Hard DriveOSMonitorPower
C300 Windows I-INC Thermaltake 850 
Case
HAF 932 
  hide details  
Gunslinger
(13 items)
 
  
CPUMotherboardGraphicsRAM
1090 MSI 890FXA GD70 5870 Corsair 
Hard DriveOSMonitorPower
C300 Windows I-INC Thermaltake 850 
Case
HAF 932 
  hide details  
post #374 of 484
Quote:
Originally Posted by Kmon View Post
Clair a few things you need to think about

One do you know how cell phones/wireless authenticates? Can you clone a phone? Can you intercept a phone call? Is there a reason why secure miltary communication change frequencies? Is there a way to intercept a kill command or more importantly send one? Is wireless encryption secure? Can you use a graphic card to decrypt or break wireless communciations?

Do you trust the techs? - Do they have gambling or drug problems? Can they be bribed or they pissed about something the company did?

Yes, there are security breaches in those companies. Security breaches are handled very discretely and usually are not made public.

A certain programmer made copies of some trading programs and was stopped before leaving the country with them. You may of heard a little about it but probably not. I wonder what company that individual worked for. I wonder how that information was removed?

The article was a nice read so is Alice in Wonderland. Who published the article? Who pay for the research? Who conducted the research?

Let see the article say the hard drive will not boot with another OS. Was the controller turn off? Can the controller be reenabled? Is the controller tied to a specific value or start code? There are way around those controls.
Those are some innovative questions Kmon. Most people would say you are delusional (sadly), but I think the information you share is very valid. And to peoples suprise: I Think it is possible to decrypt or break wireless communciations, in fact I'm sure it's being done more so than we imagine. What is a graphics card? Essentially it is a processor with many, many cores. People use them to render videos, crunch numbers, crack passwords, break wlan encryption, then cracking wireless communication with a gpu should be entirely possible.

Not that I want to.
Edited by Authie - 1/11/11 at 11:07am
Gulftown Malta
(14 items)
 
  
CPUMotherboardGraphicsRAM
i7 980x @ 4.25ghz Asus P6X58D Premium Asus 7990 12G Mushkin Redline 
Hard DriveOSPowerCase
WD Caviar Black Windows 7 Pro 800 watt Cooler Master Silent Pro Gold Silverstone Raven 3 
Audio
Asus Xonar Essence STX 
  hide details  
Gulftown Malta
(14 items)
 
  
CPUMotherboardGraphicsRAM
i7 980x @ 4.25ghz Asus P6X58D Premium Asus 7990 12G Mushkin Redline 
Hard DriveOSPowerCase
WD Caviar Black Windows 7 Pro 800 watt Cooler Master Silent Pro Gold Silverstone Raven 3 
Audio
Asus Xonar Essence STX 
  hide details  
post #375 of 484
Well i kinda dont like this it really sounds like NWO but well i'm sure there will be a workaround
post #376 of 484
Quote:
Originally Posted by Kitarist View Post
Well i kinda dont like this it really sounds like NWO but well i'm sure there will be a workaround
*Off topic:

Personally I do not believe the nwo will ever see the light of day...Not that I don't believe such a establishment/agenda exists.
Gulftown Malta
(14 items)
 
  
CPUMotherboardGraphicsRAM
i7 980x @ 4.25ghz Asus P6X58D Premium Asus 7990 12G Mushkin Redline 
Hard DriveOSPowerCase
WD Caviar Black Windows 7 Pro 800 watt Cooler Master Silent Pro Gold Silverstone Raven 3 
Audio
Asus Xonar Essence STX 
  hide details  
Gulftown Malta
(14 items)
 
  
CPUMotherboardGraphicsRAM
i7 980x @ 4.25ghz Asus P6X58D Premium Asus 7990 12G Mushkin Redline 
Hard DriveOSPowerCase
WD Caviar Black Windows 7 Pro 800 watt Cooler Master Silent Pro Gold Silverstone Raven 3 
Audio
Asus Xonar Essence STX 
  hide details  
post #377 of 484
Quote:
Originally Posted by Clairvoyant129 View Post
Killswitch has always existed. Have you heard any news of Goldman Sachs or Morgan Stanley's PCs and laptops being shut down due to some hacker hacking their kill switch? Do you know any corporations using vPro (including my company) having problems? No, but even if it did happen you wouldn't know since you're just some high school kid who lives with their mommy. And hackers can't hack your CPU to shut it down since you don't even have a vPro certified 3G wireless card supported by your company. I already know how this works since I'm using it all the time so please stop being a dumbass.

I'll repeat again how this kill switch works,



If anyone is interested read this white paper from Intel,

http://www.intel.com/en_US/Assets/PD...o+antitheft%29

vPro supports anti-theft killswitches and have always existed before Sandy Bridge.
so we don't need to worry about DRM right ?

i mean downloading using copyrighted materials at our personal computer
current
(13 items)
 
  
CPUMotherboardGraphicsRAM
Sandy Bridge 2600K ASus P8P67 Pro Zotac GTX 470 AMP 16 GB DDR3 
Hard DriveOptical DriveOSMonitor
3 X Raid 0 OCZ SSD Dvd Writer Windows 7 Ultimate Sp1 SyncMaster BX2450 
KeyboardPowerCaseMouse
Logitech 750 Watt Silverstone Open Case X7 
Mouse Pad
None 
  hide details  
current
(13 items)
 
  
CPUMotherboardGraphicsRAM
Sandy Bridge 2600K ASus P8P67 Pro Zotac GTX 470 AMP 16 GB DDR3 
Hard DriveOptical DriveOSMonitor
3 X Raid 0 OCZ SSD Dvd Writer Windows 7 Ultimate Sp1 SyncMaster BX2450 
KeyboardPowerCaseMouse
Logitech 750 Watt Silverstone Open Case X7 
Mouse Pad
None 
  hide details  
post #378 of 484
Thread Starter 
Quote:
Originally Posted by PokemonCraft View Post
so we don't need to worry about DRM right ?

i mean downloading using copyrighted materials at our personal computer
Not so much unless you are using Intel's streaming service or whatever. We'll wait and see if there is more news about this, and as more and more people are using these new SBs.

If you are paranoid I'd worry about the killswitch. As some people said, there are security vulnerabilities(though the likelihood of it being compromised would be highly unlikely).
    
CPUGraphicsRAMHard Drive
AMD C-50 1.0ghz ATI 6250 2GB 32GB SSD 
Optical DriveOSPowerCase
External DVDRW Ubuntu / Windows Vista 9 watt AC adapter :\ Acer Tablet 
  hide details  
    
CPUGraphicsRAMHard Drive
AMD C-50 1.0ghz ATI 6250 2GB 32GB SSD 
Optical DriveOSPowerCase
External DVDRW Ubuntu / Windows Vista 9 watt AC adapter :\ Acer Tablet 
  hide details  
post #379 of 484
This thread is so full of win.
The "killswitch" wont kill the processor entirely. It will just shut it off.
    
CPUMotherboardGraphicsRAM
Xeon w3680 Gigabyte X58A-UD3R GTX 295 Engineering Samples 2X Corsair XMS3 
Hard DriveHard DriveCoolingOS
Sandisk SSD Seagate Corsair H50 W7 Ult 
MonitorMonitorKeyboardCase
Viewsonic VA1912wb Viewsonic VA912b K350 CM HAF 
Mouse
Logitech M570 
  hide details  
    
CPUMotherboardGraphicsRAM
Xeon w3680 Gigabyte X58A-UD3R GTX 295 Engineering Samples 2X Corsair XMS3 
Hard DriveHard DriveCoolingOS
Sandisk SSD Seagate Corsair H50 W7 Ult 
MonitorMonitorKeyboardCase
Viewsonic VA1912wb Viewsonic VA912b K350 CM HAF 
Mouse
Logitech M570 
  hide details  
post #380 of 484
The killswitch is only available on mobile cpus, not even a relevant conversation for desktops. And the valid user/purchaser has a password/passphrase to turn the computer back on (in the event it was reported stolen, then found by the user)

Regarding the "DRM", it must be "turned on" by you 1) using a mobo that supports it 2) and using the integrated gpu 3) and using intel service, and all the "DRM" does is only allow the particular purchased media to be viewed over that particular device.

Since we are talking Desktops (no killswitches in desktop cpus) and no one is using integrated gpu, both DRM and killswitch are irrelevant.
My System
(15 items)
 
  
CPUMotherboardGraphicsRAM
6900K 4.4ghz  MSI X99A Krait Titan XP Gskill 32GB 3200 C14 
Hard DriveHard DriveCoolingOS
Samsung 960 Pro 1TB OS Samsung 850 pro 1TB games D5, XT45 280 rad, Nemesis 280 rad,  Windows 10 64bit 
MonitorPowerCase
Acer Predator XB271HU 144hz Seasonic Prime Titanium 850 Fractal Design R5 
  hide details  
My System
(15 items)
 
  
CPUMotherboardGraphicsRAM
6900K 4.4ghz  MSI X99A Krait Titan XP Gskill 32GB 3200 C14 
Hard DriveHard DriveCoolingOS
Samsung 960 Pro 1TB OS Samsung 850 pro 1TB games D5, XT45 280 rad, Nemesis 280 rad,  Windows 10 64bit 
MonitorPowerCase
Acer Predator XB271HU 144hz Seasonic Prime Titanium 850 Fractal Design R5 
  hide details  
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Intel CPUs
This thread is locked  
Overclock.net › Forums › Intel › Intel CPUs › Warning: Sandy Bridge Hardware Level DRM, Killswitch, & H67 P67 Recalls!