From: GreenXenon on
Evil NSA builds hardware/firmware rootkit chips and solders them onto
motherboards. This means the people who are supposed to protect us are
mistreating us.

http://www.spamlaws.com/how-rootkits-work.html quotes:

"Firmware rootkits are the most malicious type of malware because they
are capable of creating malcode inside the firmware while you computer
is shut down. Every time you start your computer this type of malware
will reinstall. Firmware cannot be detected by the user and is very
difficult to remove."

Also, read
http://www.google.com/url?sa=D&q=http://www.ngssoftware.com/Libraries/Documents/02_07_Firmware_Rootkits_The_Threat_to_the_Enterprise_Black_Hat_Washington_2007.sflb.ashx&usg=AFQjCNHPJJXEP6DduhTdYtFYLvrjGW0pog

http://www.rootkitonline.com/types-of-rootkits.html quotes:

"Firmware rootkit implies use of creating a permanent illusion of
rootkit malware. It can remain hidden in firmware as this is not
checked for code integrity. This was proved by John Heasman in ACPI[8]
and also PCI expansion of ROM."

http://www.google.com/url?sa=D&q=http://www.zdnet.com/blog/security/hardware-based-rootkit-detection-proven-unreliable/109&usg=AFQjCNHhdS1MB0tsuPqe0xdccOyc8BFY0w

Hardware/firmware rootkits are the nastiest type of rootkits because
there is no way to eliminate them without physically-damaging your
computer.

Even formatting your HDD won't kill the rootkit

The NSA plants rootkits in the computer chips to invade our privacy.
These rootkits act as keystroke loggers that transmit -- in real time
-- what you type, to the NSA. Even if you don't post or save a file of
your text, you're still in trouble. Simply typing whats on your mind
can land you in deep s--t.

More info:
http://www.google.com/url?sa=D&q=http://news.cnet.com/PC-hardware-can-pose-rootkit-threat/2100-7349_3-6162924.html&usg=AFQjCNGLPoLe5vpn79A99C3OKy2GU62HnQ

PC hardware can pose rootkit threat

ARLINGTON, Va.--PC hardware components can provide a way for hackers
to sneak malicious code onto a computer, a security researcher warned
Wednesday.

Every component in a PC, such as graphics cards, DVD drives and
batteries, has some memory space for the software that runs it, called
firmware. Miscreants could use this space to hide malicious code that
would load the next time the PC boots, John Heasman, research director
at NGS Software, said in a presentation at this week's Black Hat DC
event here.

"This is an important area and people should be concerned about this,"
Heasman said. "Software security is getting better, yet we run
increasingly complicated hardware. Unless we address hardware
security, we're leaving an interesting avenue for attack."

Malicious code delivered via the memory on hardware components poses a
rootkit threat since it will run on the PC before the operating system
loads, Heasman said. This likely will hide it from security software
and other protection mechanisms, he added. Such low-level malicious
code is known as a rootkit.

Moreover, because the malicious code is stored on the hardware
component and not a PC's hard disk, reinstalling the operating system
or otherwise wiping the disk won't remove the threat.

In his research, Heasman focused on graphics cards inserted in the
PCI, PCI Express or AGP slots on a PC motherboard. He found that it is
possible to load a few kilobytes of additional code onto the memory of
such cards. An attacker could do this by tricking the user into
opening a malicious file, for example, he said.

"The PCI bus was developed by Intel in the 1990s. And as we all know,
security wasn't in high respects at that time," Heasman said. "On a
well-run network, administrators know which machines are on their
network, but do they know what PCI devices are on their network? In
most cases I'd imagine that the answer is no."

The concept Heasman presented is not new. Other security researchers
have highlighted the risk before. And the industry has responded
through the Trusted Computing Group and the Trusted Platform Module,
which performs additional checks. However, the Trusted Platform Module
isn't on every PC and its capabilities aren't always used, Heasman
noted.

For increased protection, Heasman recommends scanning the memory on PC
expansion cards and other hardware components and analyzing what the
code stored there does.
From: hamilton on
On 5/12/2010 4:24 PM, GreenXenon wrote:
> Evil NSA builds hardware/firmware rootkit chips and solders them onto
> motherboards. This means the people who are supposed to protect us are
> mistreating us.

Please show a photo of a motherboard and the "rootkit chip".

hamilton
From: GreenXenon on
On May 12, 4:40 pm, hamilton <hamil...(a)nothere.com> wrote:
> On 5/12/2010 4:24 PM, GreenXenon wrote:
>
> > Evil NSA builds hardware/firmware rootkit chips and solders them onto
> > motherboards. This means the people who are supposed to protect us are
> > mistreating us.
>
> Please show a photo of a motherboard and the "rootkit chip".
>
> hamilton


It's all in the firmware.
From: hamilton on
On 5/12/2010 6:33 PM, GreenXenon wrote:
> On May 12, 4:40 pm, hamilton<hamil...(a)nothere.com> wrote:
>> On 5/12/2010 4:24 PM, GreenXenon wrote:
>>
>>> Evil NSA builds hardware/firmware rootkit chips and solders them onto
>>> motherboards. This means the people who are supposed to protect us are
>>> mistreating us.
>>
>> Please show a photo of a motherboard and the "rootkit chip".
>>
>> hamilton
>
>
> It's all in the firmware.

So, there is NO rootkit chip as you described.

So, there is NO rootkit hardware as you described.

NO one solders chips onto mother board as you described.

Ploink

hamilton
From: Nial Stewart on
> It's all in the firmware.

So Asus (say) let the American NSA have access to each and every motherboard
they produce before they ship it?


It has to be said, you're f'in mental.

:-)

N.