- cross-posted to:
- riscv@lemmy.ml
- technews@radiation.party
- cross-posted to:
- riscv@lemmy.ml
- technews@radiation.party
Ian Cutress muses upon rumors around SiFive, the forerunner of high-performance RISC-V cores.
Ian Cutress muses upon rumors around SiFive, the forerunner of high-performance RISC-V cores.
Do you mean that someone can take the design, place a hardware vulnerability and sell it? Sure, but this does not require RISC V to be possible, there are already vulnerable CPUs sold on the market. People have found such vulnerabilities already in reputable Intel CPUs for example (look up Spectre).
Dell iDRAC comes to mind as well.
iDRAC is specifically designed for remote management of serves. Calling it a back door is silly when it’s more of a front door. It’s how Dell intends for you to manage the server.
That’s the same train of thought I had when telnet was declared a back door in huawei devices.
https://www.theregister.com/2019/04/30/huawei_enterprise_router_backdoor_is_telnet/
During the hey day I passed hcna-rs, the first thing we were taught was to just use telnet as a means to enable shh, then log back in and disable telnet.
Moral of the story, do not under estimate a nation state’s use of global tech media to effect a global drop of a product or manufacturer from the market.
LUL. So you’re right but one of the horror stories I tell around campfires is how many folks don’t know about that front door.
So how about we agree to “surprise feature” for iDRAC? And, yes yes, I can feel the “they shouldn’t be admins” coming.
It has to be enabled, right? So if someone enabling iDRAC doesn’t know that it exists…
The person enabling it isn’t always still at the company.
MFW a so-called cyber security researcher learns about IPMI
deleted by creator
deleted by creator