Dude's a legend... and every year his talks become more dystopian if you think about the implications.
@Mr_i_o6 жыл бұрын
tru dat.
@TheNetherwalker5 жыл бұрын
I can't help but think about all the things he's found that he isn't talking about.
@CellularInterceptor5 жыл бұрын
@Brendon O'Connell There's NEVER been security - it's ALWAYS been an ILLUSION. It is just another made up story that most people believe!
@charlesnathansmith4 жыл бұрын
@@CellularInterceptor yeah, but "the implication"
@Neurotik514 жыл бұрын
@@CellularInterceptor I'll take somewhat insecure computing over a world without them any day.
@randomuser52376 жыл бұрын
The positive thing about this is that there are very few people in the world with the tenacity, intellect and mental discipline like Chris and go through the challenging and tedious process to uncover the backdoor. This is not something you can just stumble onto by luck. Awesome talk as always Chris, this was more interesting than most thriller movies. Just couldn't stop until the end.
@RobinObinray6 жыл бұрын
Random User i'm gonna surprise you by telling you that "very few people" like these run our prison planet world. Literally. Research using keywords....
@RobinObinray5 жыл бұрын
wertercatt you can call them whatever you want. But i know for myself, that these people are like demonic entities from somewhere inter/hyper-dimensionally...
@tomkusmierz5 жыл бұрын
Or well paid state actors ... and this talk bluntly states: "relying your core services on networked computers is giving opponent a kill switch"
@timewave020125 жыл бұрын
The positive thing is there enough people like Chris, that some of them choose to reveal the secrets they find, and freely release security tools.
@Neurotik514 жыл бұрын
@@RobinObinray lol
@tomkusmierz5 жыл бұрын
Since 1995 we (software engineers) had a common mindset - if you allow to execute someones code on your machine - it's not your machine anymore ... 24 years later - still very valid.
@nicolareiman96875 жыл бұрын
Ken ( the creator of unix) talk about it in 1984 in a paper called Trusting trust.
@SaintSaint6 ай бұрын
Yeah! Also '95 had so many less lines of code(and they did one thing well). Calc.exe... is only 27KB and YET IT CONNECTS TO THE INTERNET(for forex rates). This is stupid! No one uses calc to convert USD! New libraries and new applications keep trying to do too many things. Do one thing. Do it well. Have a way for other programs to use your program. A hilarious counter example to DOTADIW is Blender. God I love Blender... but it's also so very bloated. At least, its partially contained in modules.
@mattheck15612 жыл бұрын
The first 3:30 of this are the most razor-sharp demo of an editor-to-root exploit I have ever seen, but the most important thing in this talk is his research methodology. This guy is scary fast.
@zulowski Жыл бұрын
I've watched him in "breaking the x86 instruction set"... So happy youtub sugested this talk... three and a half minutes in, and already spoiled some words loud to my self
@ArtemShitov Жыл бұрын
"the most razor-sharp demo of an editor-to-root exploit" Although you should also remember that before that he assumed that you already have access to Ring 0 and change some register state beforehand. IMO if you have access to Ring 0, you're already baked.
@unknowndefaultguest Жыл бұрын
@@ArtemShitov I get your point. It would be interesting to see something similarly fast and clear for that precursor step as well, of course.
@ryjelsum Жыл бұрын
@@ArtemShitov except he said at the end that some other VIA processors have the necessary 'magic bit' flipped on by default... which removes the one-time ring 0 assumption from being an issue on those models assuming all else is identical
@strat55205 жыл бұрын
This guy. Just a phenomenal understanding. What an amazing SOB. Just genius.
@metaforest5 жыл бұрын
Domas is The Ring Master!!
@NolePTR4 жыл бұрын
You might say he is a Lord of the Rings.
@arlobubble37484 жыл бұрын
@@NolePTR ba dum tss
@Quancept8 ай бұрын
damn
@Tastybiscuit643 жыл бұрын
Your a wizard Harry! Nicely done, all of your instruction research is awesome AF.
@coolxjl5 жыл бұрын
"Probably a useful feature for their customers" :D Hmmm... What kind of customers and what kind of use they had in mind, I wonder :D
@elmateo775 жыл бұрын
Well I guess if the NSA gives them money then they technically qualify as a customer...
@yoloswaggins21615 жыл бұрын
This guy was hired by Intel last year, hasn't made a lot of noise since. Everyone has their price I guess.
@RN14415 жыл бұрын
Well thank goodness, he can do a lot of good there.
@dorukayhanwastaken5 жыл бұрын
@@RN1441 >Intel >a lot of good Choose one.
@sepg50845 жыл бұрын
proof?
@JB-qq1xz4 жыл бұрын
@@sepg5084 a simple google search pulls his public linkdin page...
@TheMrKeksLp4 жыл бұрын
@@dorukayhanwastaken Yeah I hate Intel patching security bugs
@AkashMishra236 жыл бұрын
This guy is not a mere mortal but a God
@Dosamer6 жыл бұрын
Damn this is interesting.
@tonirrolquimiguitau7452 жыл бұрын
I use this video as an ASMR to put me to sleep every single day
@a3axon4 жыл бұрын
I used this information to program hello world in html
@hygri5 жыл бұрын
Wow Chris, you're god mode!
@TheNoodlyAppendage3 жыл бұрын
The sad thing is all the effort companies spend trying to keep control of these products could instead be used to make them faster and cheaper.
@SirGolfalot-3 жыл бұрын
This presentation was spectacular. Of course our computer systems aren't 100% secure. So if I know about the gbit, I tend to think that I could soft trap for instruction attempting to access it. Nah
@zakmann81802 жыл бұрын
Our hardware is all run by Israeli-Russian Intelligence. All of the hardware and now software such as Windows OSs are now all done in Soviet-Israel. A backdoor into the west for Soviets now Russian and Chinese Intelligence to steal US Military technology and secrets etc.
@AvioInsane5 жыл бұрын
Why do all the videos of Chris Domas have such horrendous audio quality? I would love to listen to them but i get a cluster headache 5 minutes in.
@DingleFlop4 жыл бұрын
OMFG literally this.
@arlobubble37484 жыл бұрын
Don't listen on headphones. Very tolerable listening on a phone.
@sciencoking2 жыл бұрын
But you do need root to set the bit ... *or do you?* _vsauce music_
@mushkamusic5 жыл бұрын
Not too many humans like this on the planet.
@ruthannmarie7119 Жыл бұрын
Always someone smarter, just not one of them
@GriffBall2cold3 ай бұрын
Could this be a possible way how the pagers got taken over and exploded?
@alfin36444 жыл бұрын
Cypher sees through The Matrix
@camelotenglishtuition6394 Жыл бұрын
Amazing.. no other words for it
@kentvandervelden6 жыл бұрын
Epic!!
@denysvlasenko49523 жыл бұрын
It's obviously not an additional core, "deeply embedded" or otherwise. Instructions get executed right in the same context as surrounding x86 insns (in the ooo core, no less!). Looks like additional logic in the instruction decoder which decodes BOUND (opcode 0x62) differently (possibly only one specific form of it, with SIB byte, maybe even only with fixed values for MODRM and SIB bytes). In his example, opcode in binary is: 62 04 05 xx xx xx xx. When additional logic is enabled, this encoding no longer does the BOUND thing, instead it executes whatever is encoded in those 32 bits of xx's.
@caiocc12 Жыл бұрын
Modern (as in the last 2 decades) CISC processors actually have the decoder convert the instructions into lower level RISC instructions which are then executed. Probably this is just a bypass on the decoder so the "deeply embedded core" is just... the actual, real core. This "feature" can be extremely useful in debugging the CPU during its design, and I bet all processors have something like that, but in all probability fused off during manufacturing
@AdamBast2 жыл бұрын
Simple:you need 2752 computers and you finish in 1 day
@davidgreen73923 жыл бұрын
I'm an old ASM programmer from late last century; are we also stating that the architecture is of alien origin?
@rishav43435 жыл бұрын
lets jus t go back to the drawing board with risc-v
@svensubunitnillson15684 жыл бұрын
Rosenbridge :) clever!
@1O101O1O Жыл бұрын
WHAT UP CHRISTOPHER
@luisponce35804 жыл бұрын
Can someone please tell me if this guy gave a talk in 2019?
@Mortyst3 жыл бұрын
If you can't find it, that's probably because he didn't
@bartlx3 жыл бұрын
Intel bought him an early retirement
@ryjelsum2 жыл бұрын
Look at his linkedin, he's worked at intel since... shortly after his series of talks that blew the lid off of a bunch of x86 vulnerabilities. Interesting, huh?
@Chexsum5 жыл бұрын
thats some alice in wonderland shit
@elmateo775 жыл бұрын
So there could be malware running on a secret architecture build into your cpu... Well done Intel, well done.
@faceplants25 жыл бұрын
Intel? This whole case study was done on VIA C3 machines. He even says in the conclusion "This is an old processor, not in widespread use."
@DingleFlop4 жыл бұрын
Though, Intel DOES do shady shit, too. Check out his other talks for more info.
@soutano119794 жыл бұрын
Just had a joint and that first demonstration he did made absolute no sense whatsoever.
@ryjelsum2 жыл бұрын
Honestly, it's not supposed to make sense on the first pass.
@itfitness57914 жыл бұрын
I have no idea what im talking about, but isnt it possible to spot a deeply embedded core by slicing the processor open and having a look at the Hardware?
@GeorgeTsiros3 жыл бұрын
It is _possible_ but circumstances may make it very, very difficult.
@AntoshaPushkin3 жыл бұрын
It probably costs a ton of money to get a blueprint out of an actual CPU and then a ton of money to make sense out of that blueprint and explain what different parts do
@thewhitefalcon8539 Жыл бұрын
It's not actually a separate core, but a way to bypass the instruction decoder.
@anon589733 жыл бұрын
Should be sufficient to detect that a risc instruction has been executed. Yep.
@martinsalko16 жыл бұрын
I thought via was dead.
@RobinObinray6 жыл бұрын
Martin Šalko who🦉?
@Caesim93 жыл бұрын
They make CPUs in China now.
@GeorgeTsiros3 жыл бұрын
They still in 2021 make low power (consumption) CPUs, quite popular in the tiny form factor circles. At least, that is what i've understood
@Stu495834 жыл бұрын
He is God
@soutano119794 жыл бұрын
How come everyone in these comments seems to know what he’s talking about while it might as well be an alien language to me.
@GeorgeTsiros3 жыл бұрын
Take it slow! There is nothing demonstrated here that is above a normal person's ability to understand how CPUs work!
@AntoshaPushkin3 жыл бұрын
At computer science b.sc degree the first year of studying should be enough to understand what is described here. Also you can study computer architecture yourself. People in the comments are not random people for the most part, they should know some things to be interested in this type of content
@thewhitefalcon8539 Жыл бұрын
Here's the layperson version: with a little bit of luck and a huge amount of trial and error, he found a secret backdoor in some old Intel-compatible embedded CPUs.
@tthtlc4 жыл бұрын
I supposed all these should not exists in AMD, anyone experienced before?
@ko-Daegu6 жыл бұрын
So is anyone used the open source stuff he published...??? Wanna write an actual payload in metaspoit where I can send it to other damn ...that will be cool
@RobinObinray6 жыл бұрын
Ko- Jap or port it to ARM and iPhones🤯
@RobinObinray5 жыл бұрын
@barnyard but the algorithms should be the same at least?
@DingleFlop4 жыл бұрын
@@RobinObinray No. That's the whole point. These backdoors are built on a per chip basis. ESPECIALLY the one demonstrated here, it's using a COMPLETELY weird processor architecture with an additional bizzare core embedded in it.
@Ghi1023 жыл бұрын
It's a specific problem with these c3 chips, but the goal of the presentation is to show that it's possible. There's most likely a similar issue with the common intel and other processors, they just haven't been discovered yet.
@MichaelOfRohan2 жыл бұрын
Defcon; blackhat for happy people!
@thewhitefalcon8539 Жыл бұрын
Wait until you find out about CCC
@Bobby-fj8mk Жыл бұрын
It means that the NSA can write software to hack you - they must have forced Intel do it - that's nasty.
@Bobby-fj8mk Жыл бұрын
@MadeAnAccountOnlyToReplyToThis - Bill Gates was forced to hand over the source code to the NSA of Windows ever since Win95 and he wasn't allowed to tell the public that. They had Bill Gates by the balls. The NSA have been hacking Windows computers ever since 1995 which is 28 years. Every file on your hard disk could be read by them without your permission, every time you were connected to the internet and that is still the case right now. It's obvious that the NSA forced Intel to make their chips hackable - that's the way they are.
@ogamibirdflu5152 Жыл бұрын
The only vulnerability/problem Intel/Israel has with this is that someone was able to detect it. Its not like they put this in their chips by accident ffs.
@AdrianG962473 ай бұрын
right, they did it on purpose.
@Inus5 жыл бұрын
'so i build a tool' .. 'so i've written >name
@mariarahelvarnhagen2729 Жыл бұрын
skin in the game
@mariarahelvarnhagen2729 Жыл бұрын
Define Joint Chiefs
@JohnTurney6 жыл бұрын
Too many secrets
@ds-pc9ys6 жыл бұрын
I like all kinds of astronomy.
@whatever21444 жыл бұрын
Okkkk....f***...has it been patched? It's red flag kind of thing here.Escalation to root by HW.....same as giving him the root password....only shorter.
@ryjelsum2 жыл бұрын
THIS isn't on Intel. Only Via C3.
@qbasicmichael6 ай бұрын
And the bit is enabled by default only on certain c3 cores. And the windows kernel disables it on those via cores.
@TheMrTape6 жыл бұрын
This exact talk with the same slides were released at Black Hat 2 months ago.. Disappointing, thought this was new stuff. At least this has comments enabled.
@gaeel3306 жыл бұрын
Both talks were given within days of each other by the same researcher. Black Hat was between the 4th and 9th of August, DefCon between the 9th and 12th of August. These two events are organised by the same organisation, and have a very similar focus. Domas was invited to give his talk to both events, and I don't see why he would be expected to present different slides for this important research that cost him a lot of time, money and effort
@TheMrTape6 жыл бұрын
@@gaeel330 Thanks. You don't have to wonder what's expected because that's irrelevant to my comment. I just think it's disappointing to see "new content" on youtube that isn't new; at least it could have had a disclaimer so I didn't waste time finding out it's the exact same. The description indicates it's never released information. It's bullshit and frankly fuck off with your justifying of it; the talks themselves has nothing to do with anything, it's a video on KZbin pretending to be something new when it's not, and it wasted my time unwarranted.
@CellularInterceptor5 жыл бұрын
@Brendon O'Connell EVERY nation state uses exploits!
@rezganger5 жыл бұрын
@@CellularInterceptor U dont getit,do u..?
@djosearth36183 жыл бұрын
@@TheMrTape you make such fine use of it yourself, time ♥_♥
@recreationalplutonium5 жыл бұрын
uncle ted was right
@TheOisannNetwork3 жыл бұрын
This guy is a living osrs bot
@Bleu_sky Жыл бұрын
Only 64k views LOL
@WillbeMelek5 ай бұрын
God Mode: Hex = opinion 0f = 1 f 3f = 3 f 3 in 1 (In Christianity, a.k.a. trinity.) In Hebrew, 3 names are 1 in English. This trinity is the God Mode. Like a religious Easter Egg... 33:19 The risc Instructions are connected to Pi. a-b = AB = Father = God b in hex is 11= 2 b in English = 2 Where, 3+1+3+b and b = 92 Therefore, 7/5/92. In Pi, 1 5 9 2 = A E i B. AB = Father .E.i. = i Exist 4 1 5 9 2 = DANiEL God Mode is in Daniel. 41:42 d7 10 fd 9c G o D A M i