[Battlemesh] malware and spyware into hardware

L. Aaron Kaplan aaron at lo-res.org
Fri Feb 27 10:10:26 CET 2015


On Feb 20, 2015, at 1:33 PM, cmsv <cmsv at wirelesspt.net> wrote:

> Thought about sharing these which might be relevant to have in mind when
> buying hardware
> 
> http://www.theregister.co.uk/2015/02/17/kaspersky_labs_equation_group/
> 
> https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf
> 
> Superfish HTTPS spyware
> http://arstechnica.com/security/2015/02/lenovo-honestly-thought-youd-enjoy-that-superfish-https-spyware/
> 
> 
> 

These articles were barely touching the surface of what is happening... 
I recommend taking a look at UEFI as well as bugs/vulns in CPU microcode. 
There's a lot of fun out there.

a.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://ml.ninux.org/pipermail/battlemesh/attachments/20150227/da360cd7/attachment-0001.sig>


More information about the Battlemesh mailing list