[tor-talk] possible to identify tor user via hardware DRM?
grarpamp
grarpamp at gmail.com
Thu Jun 28 07:46:14 UTC 2012
>> can these chips be used to spying and identifying people
The summary is probably...
Only those with access to the chip masks, or an equally serious
amount of reverse engineering gear, knows what goes into a chipset.
Therefore anything is possible. And if you're not proxying the output
of suspected spy systems through your own masks to validate them,
well... you could very well be screwed :)
The rest is documented stuff you can read in any spec sheet.
Part of that material is indeed new firmware capabilities and
ways to lock it down, or not.
Don't run windows or closed source stuff if you're concerned about
what it might phone home about. UUID's, serials, MAC's, your
data, etc.
If the platform + OS can't be trusted, neither can any app
running on it, including Tor. Act accordingly.
Nothing here related to Tor.... your questions should go to the
author of that post or comp.risks.
More information about the tor-talk
mailing list