[ home ] [ q / soy / qa / r / nate ] [ a / health / incel / int / mtv / pol / psy / raid / sci ] [ overboard ] [ rules ] [ bans ] [ wiki ] [ booru ] [ archive ] [ merch ] [ donate ]

/tech/ - Technology

Name
Options
Comment
File
Embed
Password (For file deletion.)

File: 1687400968072.png (42.2 KB, 243x255, 1681373255991.png)ImgOps

 6522

>we must use a half broken OS to own the window store clerk or something

 6524

File: 1687437603234-0.png (649.24 KB, 1024x768, the windows is better than….png)ImgOps

File: 1687437603234-1.png (246.91 KB, 631x435, windows 10 new update dele….png)ImgOps

File: 1687437603234-2.png (1.75 MB, 1536x864, winglows wintoddler 11 ads.png)ImgOps

File: 1687437603234-3.png (522.32 KB, 1280x1106, winglows wintoddler carbon….png)ImgOps

>half broken OS
theres a good reason why winkike doesn't power 96.3% of the entire internet.

 6535

>>6524
nobody here is powering the internet nigger, we use the internet, goon & play video games and windows does that better than troonix

 6536

File: 1687454792444.png (209.91 KB, 1024x1024, profound mental retardatio….png)ImgOps

>>6535
>durr hurr whats a server?
>is that some 'cord shit?

 6539

>>6536
who are you quoting

 6540

>>6536
I run OpenBSD on my servers because I'm a white man

 6559

>>6540
openbsd is an aryan gem, do you run it as a desktop os?

 6560

File: 1687475163151.jpg (548.39 KB, 1078x1917, average_OpenBSD_User.jpg)ImgOps

>>6559
>>6540
The NSA's backdoor into OpenBSD's Compiler and Kernel
The backdoor was initially introduced using compiler backdooring, which involves modifying the code of a compiler itself to introduce a backdoor into the output executable. In this case, the backdoor was added into the clang compiler, which is used to compile C and C++ code on OpenBSD.
To introduce the backdoor, the NSA used TCP 0day exploits to gain access to the OpenBSD network and modify the binary of the clang compiler on an OpenBSD development server to cause the backdoor to spread into any compiled programs which on execution would infect the system's clang with the same backdoor, as well as adding a new function that could be used to execute arbitrary code with root privileges. They also added a trigger condition to the code that would activate the backdoor only when certain conditions were met, such as upon recieving a specific network packet.
Once the backdoor was added to the compiler code, it was compiled and included in the OpenBSD kernel and other parts of the operating system. This made it incredibly difficult to detect, as the backdoor code was hidden among legitimate code.
The NSA went even further and managed to replicate the backdoor in the BIOS firmware of affected systems. This was accomplished by distributing several BIOS 0day exploits using the original backdoor onto the systems, installing the same backdoor payload as the compiler and kernel onto the system's BIOS image.
The BIOS payload was designed to execute the backdoor code during the system boot process, before the operating system had loaded. This allowed the backdoor to remain fully persistent, even if the hard drive was wiped and the operating system was reinstalled.
The firmware payload was added to a specific area of the BIOS that is not typically overwritten during a standard BIOS update or reflash.
It's also worth noting that this exploit is not limited to OpenBSD or even the x86 architecture, and could potentially be present on many more platforms than we currently know of
Overall, the NSA's backdoor in the OpenBSD clang compiler and kernel, and its replication in the BIOS firmware, represents a serious threat to privacy and security. The techniques used to introduce and replicate the backdoor are incredibly advanced and difficult to detect, and nearly impossible to remove without the replacement of hardware.
https://marc.info/?l=openbsd-misc&m=143355112811564

 6561

>>6560
if they put this much effort into backdooring a low-usage os like OpenBSD, imagine what they've snuck into freebsd, linux, or (insert your preferred kernel here).
besides, no one is safe from the NSA unless you lock yourself in a faraday cage.

 6574

>>6561
demoralization bait
yes, they DID backdoor freeBSD and lunix as well, but theyre fairly easy to remove
just kick out all binary blobs, theyre all malware and can only fuck up your machine, there is zero reason to keep them.

 6580

>>6574
>theyre fairly easy to remove
thats quite optimistic isnt it now

 6595

>>6580
deblob your kernel

 6597

>>6595
deblobbing wont save you from 0 days or deliberately inserted backdoors

 6604

>>6597
forgot to add, dont run proprietary shitware.
if some program WANTS to get to ring 0, it will figure out how to no matter how many "mitigations" and performance crippling backdoors you have.



[Return][Go to top] Catalog [Post a Reply]
Delete Post [ ]
[ home ] [ q / soy / qa / r / nate ] [ a / health / incel / int / mtv / pol / psy / raid / sci ] [ overboard ] [ rules ] [ bans ] [ wiki ] [ booru ] [ archive ] [ merch ] [ donate ]