EPISODE 272-Processor Attacks Explained
This week Paul Asadoorian joins me to explain vulnerabilities within our computer processors and current solutions.
Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free.
SHOW NOTES:
INTRO:
None
NEWS & UPDATES:
https://inteltechniques.com/tools/
https://inteltechniques.com/workbook.html
https://unredactedmagazine.com/
PROCESSOR ATTACKS EXPLAINED:
Paul Asadoorian
https://twitter.com/securityweekly
https://eclypsium.com/2022/07/26/firmware-security-realizations-part-1-secure-boot-and-dbx/
https://github.com/mjg59/mei-amt-check
https://github.com/chipsec/chipsec.git
https://github.com/intel/INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools
https://github.com/ptresearch/mmdetect
https://github.com/corna/me_cleaner/
Free Guides: https://inteltechniques.com/links.html
Affiliate Links:
Extreme Privacy (4th): https://amzn.to/3D6aiXp
ProtonMail: https://go.getproton.me/aff_c?offer_id=7&aff_id=1519
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=277
PIA Dedicated IP VPN: https://www.privateinternetaccess.com/ThePSOSHOW
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket Bags & Wallets: https://slnt.com/discount/IntelTechniques