It's more like the other way around. The NSA knew about this long ago but didn't tell Intel.
Yeah, sure. And AMD, ARM, Microsoft, Apple, Google etc. all kept it secret to protect Intel. Keeping security holes secret until they are plugged is only done to protect the brand. [/sarcasm]That said, Intel deserves to pay for this. They are lying through their teeth. The only reason they kept it a secret is because they didn't want to hurt their brand and subsequently their wallets. They put greed above our personal security, and also above the country's national security.
From all the security vulnerabilities that have become public, the Meltdown and Spectre group is probably the least likely to have been a plant. You make the classic mistake of assuming that the larger an event is, the larger the intention must have been behind it. In earlier times, when a catastrophe struck (natural disasters, epidemics), humans also attributed it to a higher force, and the larger the catastrophe was, the most certain people were of the involvement of intention behind it.The NSA and other nameless intelligence services probably directed the inclusion of Meltdown and Spectre years ago for their own benefit.
What other vulnerabilities have they managed to sneak in that no one else knows about yet? Corporate espionage and sabotage via intelligence services is a thing.
Knowing Trump and other Republicans are running the Government, I wouldn't tell those psuedo-politicians either.
So in a country in absolute hysterics over “hacking” the overall sentiment in the thread is that the US government shouldn’t have been informed
What if no disclosure gave the big scary Russians the ability to hack into our intelligence apparatus....seeing as most of it runs on hardware effected by these flaws?
Knowing Trump and other Republicans are running the Government, I wouldn't tell those psuedo-politicians either.
Impossible to tell whether Intel wouldn't have done so if it hadn't been leaked prematurely. Intel might very well have told the government a couple of days before they went public if they had been able to roll out all the fixes they wanted to roll out.I’m not a fan of the government either but with the security risks these threats posed not only to US citizens but governments as well, it was warranted for Intel to at least give a heads up before it went public.
There is no way of knowing that. The NSA aren't Superman that finds all flaws before the dedicated security researchers in the private sector.It's more like the other way around. The NSA knew about this long ago but didn't tell Intel.
I'm pleasantly surprised (glad) to read the responses here.
Except this one. Why would you think they would tell other governments, but not the US government? My understanding is there was zero disclosure to anyone until it was made public.
The equations group, their top secret group exposed by Kaspersky a few years back (hence the intelligence agencies disgusting attacks on the company) is considered the absolute best of the best when it comes to researching vulnerabilities.There is no way of knowing that. The NSA aren't Superman that finds all flaws before the dedicated security researchers in the private sector.
Just because they might be the best, doesn't mean they would be anywhere close to finding all the flaws. If critical open-source software (eg, SSL/TSL) can have severe bugs for years with every security researcher on the planet having access to the source code, then a subset of them (ie, the NSA), even if they are the best, that won't always have access to the source code, will be far from able to find most of them.The equations group, their top secret group exposed by Kaspersky a few years back (hence the intelligence agencies disgusting attacks on the company) is considered the absolute best of the best when it comes to researching vulnerabilities.
Because all it takes, is for them to decide they want it. Because that worked so well for them with the clipper chip.Now, are we supposed to believe that the agencies that designed the "clipper chip" in the 1990's haven't decided to embed their personal in the encryption standards bodies after the spectacular failure of the chip program?
Sure, they haven't given up trying. But you trusting that they probably knew about all major existing flaws before they got revealed, is as unrealistic as trusting that fully patched software doesn't have any flaws that are being exploited.Of course this isn't proof of anything, but simply put I do not put any trust into any extra-legal US agencies, given the last oh....70 years of history for my reasoning.
We would like to thank Intel for awarding us with a bug bounty for the responsible disclosure process, and their professional handling of this issue through communicating a clear timeline and connecting all involved researchers. Furthermore, we would also thank ARM for their fast response upon disclosing the issue.
This work was supported in part by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No 681402).
This work was supported in part by NSF awards #1514261 and #1652259, financial assistance award 70NANB15H328 from the U.S. Department of Commerce, National Institute of Standards and Technology, the 2017-2018 Rothschild Postdoctoral Fellowship, and the Defense Advanced Research Project Agency (DARPA) under Contract #FA8650-16-C-7622.
Steady there, Mr Hyperbole.US spies are an enemy to US citizens and mankind.