Not sure if joking or naive…
Comment on Undocumented 'Backdoor' Found In Chinese Bluetooth Chip Used By a Billion Devices.
starman2112@sh.itjust.works 1 day agoNone of them, that’s why the only things in my house that connect to the internet are my computers, game consoles, and cell phone
targetx@programming.dev 19 hours ago
starman2112@sh.itjust.works 19 hours ago
Like I said 6 hours ago, just because I can’t mitigate all of the risk doesn’t mean that I shouldn’t mitigate as much as I reasonably can.
My 3d printer is a fire hazard, but that’s no reason to leave a bunch of candles unattended.
targetx@programming.dev 19 hours ago
Ah I missed the other comment, my client still had a cached view apparently. And definitely true regarding mitigation, your phrasing just read funny to me :)
catloaf@lemm.ee 1 day ago
I guarantee all off those have components from manufacturers that a government could pressure for a backdoor.
starman2112@sh.itjust.works 1 day ago
You are correct, and it doesn’t change my stance at all. It’s still worth it to mitigate risk even if you can’t mitigate all risk.
Like, the fact that my 3d printer is already a fire hazard does not justify leaving a bunch of candles unattended
BeardedGingerWonder@feddit.uk 1 day ago
Assuming you’re not joking here, if your computers are any way modern they almost certainly have a backdoor.
starman2112@sh.itjust.works 1 day ago
Obviously not, but I trust my laptop a hell of a lot better than my aunt’s XIPPLG branded wifi cat feeder that she bought off Amazon
BeardedGingerWonder@feddit.uk 6 hours ago
You probably shouldn’t, check out Intel management engine and AMD secure technology.
starman2112@sh.itjust.works 5 hours ago
From what I understand, the only way to mitigate the risks relating to IME or AMD PSP is to simply not have a computer in the first place. Like I’ve said elsewhere twice now, it’s worth mitigating some risks even if we can’t mitigate all of them, and given the fact that the entire internet hasn’t collapsed, I’m going to assume IME isn’t as big of a security vulnerability as it looks.