by quantumpotato_ on 1/15/14, 4:08 AM with 4 comments
by na85 on 1/15/14, 5:12 AM
They could have hardware backdoors installed that would theoretically be undetectable unless you opened your case up and physically compared each chip and integrated circuit against a known whitelist.
They could have software backdoors installed in the form of firmware or microcode. Auditing these things is also very difficult because most of the time the manufacturers do not provide much (if any) documentation.
They could have malicious peripherals installed such as usb cables with hardware keyloggers built in, in which case you'd have to physically cut open all your cables, etc.
They could have rootkits installed, though there are tools such as rkhunter and chkrootkit that attempt to discover these.
>Intel chips that are known to be sabotaged
Check your chip(s) against any known blacklists or whitelists that you might have access to
>programs I can run to search for network interference?
Depends on your level of paranoia, but a sophisticated rootkit could hide network traffic from any firewalls on your machine, so you'd need to do monitoring with a second machine using something like Ethereal (I think it's called Wireshark these days?)
by staunch on 1/15/14, 5:53 PM
by gotwalt on 1/15/14, 5:46 AM
by yen223 on 1/15/14, 6:25 AM