- Highlight
- #1
Intelligence agencies are the biggest liars. Don't believe them when they say there is no backdoor in CPUs.
I assume they have had some sort of remote access to billions of computer devices for years, and their AIs analyze people's data constantly.
Hardware backdoors need straightforward access to the clearnet in order to leak information to intelligence agencies.
Thus, in theory, blocking straightforward access to the clearnet is sufficient to block remote access by Intel ME and AMD PSP.
To defeat firewall network address translation, hardware backdoors need to contact servers over the internet.
By installing a general-purpose linux distribution on a router single board computer such as NanoPi R4S and making it route to the internet only via the router's internal VPN,
you can prevent computers behind the router from giving hardware backdoors straightforward access to the internet.
You can configure computers behind the routers to access the internet via the router's internal VPN.
You can run OpenVPN, but I think yggdrasil or wireguard is better because I don't want to update OpenVPN certificates regularly.
One problem is that even ARM single board computers come with proprietary blobs. Even if you assume that intelligence agencies have remote access to your ARM router, they may not be able to access computers behind the router because the hardware backdoors behind the router can't access the internet.
I assume they have had some sort of remote access to billions of computer devices for years, and their AIs analyze people's data constantly.
Hardware backdoors need straightforward access to the clearnet in order to leak information to intelligence agencies.
Thus, in theory, blocking straightforward access to the clearnet is sufficient to block remote access by Intel ME and AMD PSP.
To defeat firewall network address translation, hardware backdoors need to contact servers over the internet.
By installing a general-purpose linux distribution on a router single board computer such as NanoPi R4S and making it route to the internet only via the router's internal VPN,
you can prevent computers behind the router from giving hardware backdoors straightforward access to the internet.
You can configure computers behind the routers to access the internet via the router's internal VPN.
You can run OpenVPN, but I think yggdrasil or wireguard is better because I don't want to update OpenVPN certificates regularly.
One problem is that even ARM single board computers come with proprietary blobs. Even if you assume that intelligence agencies have remote access to your ARM router, they may not be able to access computers behind the router because the hardware backdoors behind the router can't access the internet.