Categories
Computers and IT

Confirmed … Insecure Computer Processors

Latest from Intel: We’ve Found Severe Bugs in Secretive Management Engine, Affecting Millions. What I am about to talk about is a topic in my mind that has grown over the years. When I started out in information technology 20ish+ years ago, I had no idea how the journey would unfold. I was immersed in IT. Like many, there was this naive expectation of the bountiful possibilities that technology could unfold. IT was treated like a kind of magic backed by logic, reasoning, and empirical process. Fast forward to the mid 2000s and we see a different reality begin to unfold.

Data breaches start out slowly. First, you had worms. Remember the old Slammer worm? At the time, we could blame it on oversights by Microsoft. In our collective hopeful attitude, we overlooked such things thinking in the back of our minds that it will get fixed. Every exploit, data breach, vulnerability, or spyware problem was ultimately explained away with the phrase, “technology changes and things get better.” Over the vast course of time that may be true, but when you are living right now with bad technology that somehow destroys your life, none of the hopeful aspirations serve as consolation.

The data breaches kept expanding in number and scale. The entire time, we were all “this software is bad or that” and much of that was true. An unwavering faith in hardware led us to think that if only the software could be written better. If only Intel could produce a more secure computer architecture. They purchased McAfee and many of us thought that security improvements were sure to come. Surely, the best engineers can solve these problems. All the tech companies with all the PhDs money could buy with huge advances in machine learning could not put Humpty back together again.

Just over 20-years of security flaws. Let’s say we had a top tech engineer and PhD workforce of about 200,000 individuals throughout that time. I am excluding everyone who doesn’t work on core technology (operating systems, drivers, chip designs) upon which pedestrian technology (websites, desktop programs, batch jobs, and apps) are built. That represents roughly 8,320,000,000 hours for all individuals on a 40-hour work week. That is being conservative. All that money spent, 8.3 million hours of collective effort and what the results show is that digital computer technology is inherently flawed and fragile when it comes to information privacy, security, and protection.

Cryptography systems have been broken. SSL is broken. RSA is broken. PKI in general is broken. Sure, you could say that many breaches occurred due to a failure to update systems. On the other hand, what about the concept that the original code was expected to be the best in the first place? Stating that all software has bugs or flaws are inevitable proves the point. It is unwise to trust monetary transactions and communication of sensitive information such as social security numbers and their like over digital technology. Compared to the issues in digital, the best move is to revert many systems of a monetary nature and those involving sensitive individual information to analog systems and processes pre-Internet era.

Net neutrality reversal? Who cares. Let the big companies charge a huge toll because the medium itself is untrustworthy to begin with. Alternative voices are proposing the creation of a new Internet. The counter argument to that is by what basis, track record can anyone prove they have the methodology, first principles, and end-to-end conceptual model to define a better Internet when not even billion dollar companies can pull it off. Apple’s Face ID was cracked by a 10-year old recently. Absolutely nobody understands 100%, lock solid digital security. If they did, they’d have to burn the entire tech status quo to the ground and put in place new stuff that is 100% incompatible with what came before. Anyone pursuing that is hopefully not using the cloud as it turns out Over 400 of the World’s Most Popular Websites Record Your Every Keystroke.

Top Hackers have long known everything I’ve stated above. They are intimately familiar with the fact that digital technology is an open book. As soon as you decrypt data, it is transparently visible on the computer itself from CPU to hard drive and everything in between. You cannot hide information in a computer. That is part of the reason Why Hackers Reuse Malware because it works. When you think deeply about the interacting parts of a computer, as has been defined since Von Neumann, it really is like Neo’s Matrix in terms of the ability to fully bend it in directions good and not so good.

The latest question on Slashdot asks How Are So Many Software Vulnerabilities Possible? The question is partially complete when you consider that the hardware itself is vulnerable as well. However, just looking at software, a major contributor to the problem is an over abundance of emphasis on the business concept of Opportunity Cost. Besides that are the narrow deadlines, the unwillingness to slow things down so there is a curated and cultivated security architecture upon which a system is defined. It is still a features and functionality business with security considered a separate issue given less investment. Unfortunately, even if the developers did well in business programs, there is still the problem of the operating system, database technology, drivers, hardware, etc. A weak link breaks the entire chain and digital technology has many weak links.

Finally, I end with this post, Everything is Broken. That post says in more eloquent statements what I am implying here. I do reach a slightly different conclusion. Continue to use computers. Use them for fun, games, convenience, moving data around, talking to friends and family. Useful automation awaits when private individual’s information is not part of the mix. Just be aware that casual or professional activities may be okay but using the Web, mobile, and computers for sensitive communications is a huge risk.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.