What's behind the Broadcom, Qualcomm and Intel acquisition (backdoor inside)

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@crt·
0.000 HBD
What's behind the Broadcom, Qualcomm and Intel acquisition (backdoor inside)
Two months ago, I covered some insights about [Meltdown and Spectre](https://steemit.com/technology/@crt/meltdown-and-spectre-a-global-hypocrisy), but to quickly recap, is was about the fact that's well known within low level engineers and hardware manufacturers are well informed about for 20 years. It's not the flaw, not designed to be a flaw, rather an intentional backdoor according to FIPS (among many others) regulations. I called that a global Hypocrisy.

> It's clear and well documented it's no vulnerability, rather then manufacturing requirement. Once exploits awareness was raised within general public, it was declared a vulnerability. The fact that every single engineer who worked at low-level chip manufacturing knew about them for 20 years - never mind, let's just act crazy.

But the things are moving forward with even more Hypocrisy then ever expected.

The recent development on US ban against Chinese manufacturers of upper class technology devices such as Huawei, was a clear move to restrict the market share towards "obedient" players. AT&T dropped support to offer Huawei products. And no, it's not the idea to protect US manufacturers as they have very straight market share within the higher upper class of products, with Apple being dominant. There's no way for Huawei to get into that consumer grade not it was reasonable to attempt to. Historically, they never tried that.

## 5G is coming our way, and it's time to secure nothing will change in terms of ability to perform global surveillance.
<br>

- Full access to any device that has (intel based) chip inside is secured almost 20 years go. [Covered Here](https://steemit.com/technology/@crt/meltdown-and-spectre-a-global-hypocrisy)

- Ability to gain unauthorized access any account / being that email, bank account, social media is achieved almost 10 years go [Covered Here](https://steemit.com/technology/@crt/this-is-how-you-are-getting-hacked-institutional) (Deep Technical Analysis in plan language, requires attention while reading, names of corporation hidden intentionally).

- Social engineering techniques in combination with above (to name most simple one) [Covered Here](https://steemit.com/privacy/@crt/a-different-view-of-how-much-privacy-you-really-have) are in place since 2G and first Sigtran abuses, including map commands such as SRI PSI and ATI.

- Bitcoin, the "untold story" [Covered Here](https://steemit.com/bitcoin/@crt/bitcoin-untold-story-or-just-a-fairy-tale) describe some approaches being used to cover up massive money transactions, making hard to understand and connect some of the articles above, especially the second one that involves incorporations in various international territories and subordinaries. 

- Ok, that got a bit out of ability to control due to simple math paradox [Where's the can opener - inside the can](https://steemit.com/bitcoin/@crt/where-s-the-can-opener-inside-the-can-math-wins-in-bitcoin-battle). Leading to inability to shut the project down just like that, but you probably noticed they are trying real hard. At least, non of these would be discovered if they missed that simple paradox, and the fact that large US corporation forgot to route single attack through proxy. (second point).

- Not to mention ability to perform man-in-the-middle intentionally due to  [SSL "Oversight"](https://steemit.com/ssl/@crt/ssl-policy-oversight) 

These articles published separately are in place for those 'conspiracy theorists' to understand how things really work without much conspiracy in front of our eyes, yet technically described so anyone willing to put some brain work can understand them.

## Back on topic, Broadcom, Qualcomm and Intel

<br>

The recent developments of merger between Broadcom and Qualcomm resulted in series of news about possible compromise of National Security, issued by mother of all fake News - US news publishers. What's behind, is making a strong ground for Intel to jump in as a 'savior'.

With these chips produced independently, still makes possible for small manufacturers to combine them into products without compromising user security, the situation is most likely to result in merger between all three players. That would mean, a whole networking and processing stack probably embedded into a single units. I suspect Tilera is what's next on target due to large success with Mikrotik enterprise line of networking products.

The result: National Security is Saved.

**The real result, if you are about to try to make something that's safe, you are likely going to need a precision Microscope among other equipment :)**

![backdoor-intel-management-engine.jpg](https://steemitimages.com/DQmZjYXvbUZSxUv2Sw2oD3bHEzdhjtkL9ticJBp5XXEor4E/backdoor-intel-management-engine.jpg)

Feel like living in cyber-punk age? Probably you are. Good luck trying to connect the dots. Chances are, you are about to migrate from Conspiracy theorist into a theorist.

____

Like my articles?

Approve my witness work [Here](https://steemconnect.com/sign/account-witness-vote?witness=crt&approve=1)

By up-voting this or supporting my witness work, you are also helping the upcoming book, that will cover many aspects of Institutional IT Security Hacking Activities, such as some covered here, and connected articles.
👍 , , , , , , , , , , , , , , , ,