Persistent Motherboard Bootkit Backdoors Hide - Are You Compromised Already? *NEW* computer come with backdoors? Might your motherboard have persistent (permanent) invisible malware / backdoor? We explore the evidence: previous computers discovered to carry motherboard backdoors, including recent UEFI vulnerabilities 2024, inspired by the recent supply chain Lebanon Pager story
And we take a look at journalist published documents on the
#1 place for hiding backdoors inside computers. And it's not on your harddrive / SSD.
Potential interest by actors around the world in hijacking supply chain can lead to invisible watchers inside our devices
After exploring the supply chain connections to Lebanon pager explosion attacks, this sounded like an appropriate follow up.
UEFI: Unified Extensible Firmware Interface. Firmware existing on motherboard of a given computer / router / device. This firmware is stored directly on what are known as flash chips.
Those flash chips can be read, and even overwritten with malicious, or even safer firmware (example: coreboot).
The danger of UEFI firmware backdoors lay in the fact it functions entirely independent of computer storage / operating system. Removing the storage, or installing Linux won't fix a backdoor on the motherboard - only disabling backdoors that depend on specific operating systems (windows / linux / OS X).
UEFI loads before the operating system and has the greatest potential for persistent bootkits / supply chain infiltration.
My analysis inside.
You can help keep this channel alive by sharing this content. The entire idea is to grow a community / audience. That's the reason for making content - for more people to see it.
*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*
Join me today in this. Leave a comment, share a thought.
EMAIL: righttoprivacy[at]
i2pmail.org / righttoprivacy[at]
tutanota.com
(VIDEO SHARED EARLY ON PUBLIC BLOG: http://righttoprivacy.i2p /
https://bmc.link/politictech)
*Watch, And Share With Others!*
#supplychain #backdoors #cyber
I create independent content to keep you informed, share unique tips (many times, completely original ideas, including not found elsewhere), and cover stories to keep you informed on the most pressing personal security / human rights privacy / open source topics.
*If you learn something here, consider supporting below* (sharing a video on social media is another great way to support this, motivating more time to new content)
💎 *THANK YOU FOR CONSIDERING SUPPORTING THIS CHANNEL*
💻 LAPTOP (more open Linux hardware):
https://bmc.link/politictech/commissions (options)
MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
CASHAPP -
https://cash.app/$HumanRightsTech
MEMBERSHIP:
https://bmc.link/politictech/membership (early / exclusive / more)
SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻
**PUBLIC BLOG:**
https://bmc.link/politictech/posts
*I2P HOSTED BLOG:* http://righttoprivacy.i2p
First shared on public blog:
https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support my work [not required - sharing videos best way to support this])