It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Intel "Insider" technology on new chipsets

page: 1
2

log in

join
share:

posted on Oct, 4 2012 @ 12:07 PM
link   
I picked up a new laptop and I think I just stumbled across a new Intel capability.

I know Intel has "vPro" in their new processors to secretly get into computers so I decided to ditch the wireless card inside the computer, to make it HARDER for them to find their processor, since the MAC address won't be the same. (Every wireless card has a permanent MAC address).

So digging through the computer parts box I grabbed an old mac mini artheros chipped wireless card (ewww Apple...I know)

Anyways the wireless card worked great once Linux was loaded for a couple days.....then it couldn't get any "bars" anymore....somehow it got weaker.

From what I found out from looking so far it appears the Intel Sandy Bridge "Insider" digital rights software secretly running on the chipset saw the Apple wireless card on a Non-Apple computer and Intel turned her wayyyy down.

Scroll down to the bottom where it says "Intel Insider":

en.wikipedia.org...


Intel now has "vPro" which is a secret operating system running inside a secret core on the CPU's, and now they have "Intel Insider" running on their new chipsets as well.

Holy Jeez,,,,,......They can get into ANY computer now and there's NO WAY to keep them out. How is this legal??? Has America gone MAD??? Now they can tap into peoples computers and put Kiddie-Porn on them then make an anonymous tip to the police. There's no way we can keep Intel (NSA/CIA/MAFIA/FBI) out.



posted on Oct, 4 2012 @ 12:16 PM
link   
reply to post by Pervius
 


Just an idea... but maybe you could use a wireless router running dd-wrt or tomato to mimic a secondary "made-up" mac address which might then allow you to use the original wireless card (unless this is an always-portable application) with the original wireless card mac address hidden. If it is semi-stationary, you can also use the wired 10baseT port into a wireless router faking the mac. In either case you would make your IP static to match the router. As I said, just an idea to possibly get around the internal coding but maybe I need more information on the process as well.

Cheers - Dave



posted on Oct, 4 2012 @ 12:21 PM
link   
Okay here is a pro tip to keep them out of your computer. I doubt it has a 3G connection and just the wireless and Ethernet. Step 1 (which you have done) remove the wireless card. Step 2 unplug the Ethernet cord. All steps are complete and never go back on a step and undo it as this will result in a breach of your security. I hope this helps.



posted on Oct, 4 2012 @ 12:23 PM
link   
reply to post by bobs_uruncle
 


That would work unless there was a "call-home" code written into one of the cores then it really wouldn't matter what you do to spoof the MAC.



posted on Oct, 4 2012 @ 04:29 PM
link   

Originally posted by Vodo34861
reply to post by bobs_uruncle
 


That would work unless there was a "call-home" code written into one of the cores then it really wouldn't matter what you do to spoof the MAC.


If that is the case, then you need a kernel hooked process to filter communications at the machine level to prevent communication between the processor and any external component. I expect however it would be a bit tricky as you would have to run a process that was very specific. The process would have to act as a gatekeeper.

Cheers - Dave



new topics

top topics
 
2

log in

join