[Battlemesh] malware and spyware into hardware
L. Aaron Kaplan
aaron at lo-res.org
Fri Feb 27 10:10:26 CET 2015
On Feb 20, 2015, at 1:33 PM, cmsv <cmsv at wirelesspt.net> wrote:
> Thought about sharing these which might be relevant to have in mind when
> buying hardware
>
> http://www.theregister.co.uk/2015/02/17/kaspersky_labs_equation_group/
>
> https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf
>
> Superfish HTTPS spyware
> http://arstechnica.com/security/2015/02/lenovo-honestly-thought-youd-enjoy-that-superfish-https-spyware/
>
>
>
These articles were barely touching the surface of what is happening...
I recommend taking a look at UEFI as well as bugs/vulns in CPU microcode.
There's a lot of fun out there.
a.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://ml.ninux.org/pipermail/battlemesh/attachments/20150227/da360cd7/attachment-0001.sig>
More information about the Battlemesh
mailing list