@uranther I’ve been looking to the last 5 years conferences videos of CCC and I couldn’t find yet the one I was talking to you about implementing a persistent hidden channel transmitter in a laptop’s CHIPSET (Northdridge) holding the ethernet controller, by hacking the CHIPSET’s embedded software. This POC / Demo was used to implement a hidden keylogger, but transmitting UUID tag could have been done instead... I’ll find it if it has not been deleted.


@uranther Here it is :


This kind of hardware backdoor is a perfect base to build an "Active fingerprinting tracker".

Be sure all biggest agencies are playing this game.

Instead of using the malware to send keystrokes, you can send those UUID's / Integrated circuits serial numbers and you're done.

He's exploiting a known IP hidden channel, but many other could be used at raw IP level, or in higher protocol layers normalized by W3C.

Tor is a diversion.

Β· Web Β· 1 Β· 3 Β· 4

@uranther You are welcome.

But back to these "Active Fingerprint technics", we really have all the experience and knowledge to fight back.

There are several important stuff to keep in my when fighting back :

- Consider that there will always be serial numbers into the integrated circuits we currently use, even secret ones, not documented, that will allow to build UUIDs.

- All the IP based protocol we design should always be hidden channel safe, forcing the attacker to use raw IP hidden

@uranther channels that have all been extendedly stuided and identified. Most of them are very slow, and it is possible to develop some kind of proxies that eliminate most of them.

- Software only approches can work, as the one I described in this long thread, but they come with medium to high strict mandatory security procedures, making them hard to use.
- Same for FPGA approches.

- Combining differents approach allow simpler security procedures, and ensure a better result.


- Software tricks like the one I described.
- Free Integrated Circuits FPGA based approaches like the one I presented to a few hacker friends.
- Using hidden channel safe protocols, and special proxies to "filter" as much known raw IP level hidden channels, combining all this, we can achieve true anonymity with relatively low complexity security procedures. But until we have computers 100% made out of Free Integrated Circuits (IC that end user can verify its integrity) that would be

@uranther garanteed without any kind of serial numbers, there will always be mandatory security procedures attached to the solutions we develop.

We should also ensure those Free Integrated Circuits computers are really state-less systems, like good old ATARI ST computers with their system stored into EPROMs. Flash memories are cool, but an open bar to insertion of UUIDs by an attackers reflashing your BIOS Flash, tagging your hardware with it, and therefore using it to tag your datagrams...

@uranther Thank you for this paper, will add it to my collection :-) . Yep. persistent rootkits sucks. To me, simply putting back BIOS or OS to true good old EPROMs is already a very good step forward to state less computers, which are also a very important thing to fight back those active fingerprint technics too.

So you see, all those who keep pushing propagand on the god Tor make me laught. They don't want people to understand (science), they push people to believe (religious) in things.

@uranther @rootkovska Yep, this is a very good presentation... I felt less lonely and isolated when I saw it :-)

True crypto-anarchists above petty cyber-geopolitical wars is really a small highly persecuted and endangered community. One of our best weapon is really to spread knowledge as luch as we can.

* Thinking back to Aaron Swartz death. This honnest comrade was murdered. I will never believe in his suicide. Never.

@uranther @rootkovska A whole cyberspace architecture, with all its many layers, components, is just a meta-system, it's a giant world wide state machine, made of specific network topologies, protocols, software and hardware, but in the end it's all state machines and programming, but it was religiously seeded by the centralized concepts in what I call "Day 1, 2 and 3" in earlier toots. Everything has been deterministic from these wrongarchitectural initial choices, and now we have fascism.

@uranther @rootkovska @niconiconi I work strongly on kernel as hardware, it is clearly the future, but most people still think of these approaches mainly CPU oriented, which is already very good, but I am more attracted to non-CPU oriented ones, it doesn't mean to get rid completely of turing machines, but I don't consider them any longer as a mandatory technological brick for all digital systems and applications.

@uranther @rootkovska @niconiconi I never said we had to get rid of turing machines completely, but no-CPU systems is the path I am exploring and were I am doing most interesting discoveries. I am working on concepts of meta-cyberspaces architectures (Cyberspaces that can hold different cyberspaces with different cyberpower models) being a worldwide meta-FPGA grid... and having a very minimalist "neutral" cyber-power model... The notion of computer with CPU & servers are absent to these concepts

@uranther @rootkovska @niconiconi Yes, I do the same, message passing only. It is architecturaly very interesting in terms of cyber-security model. DOing so means revisiting completely the notion of library by the way, current library concept sucks.

@uranther @rootkovska
When blowing hardware and software artificial boundaries :

- Software = Massively mutable and sequential programming using turing machines.

- Hardware = Massively immutable and parallel programming, often used to implement turing machines.

But it's all programming, and if you get to a higher level of abstraction, it's all state machine and architectures. This also includes protocols, network topology.

The concepts of CPU/Turing machine are a fucking jail for the mind.

@uranther They create fake technological gods and divinities, churches, and their pastors and prophets.

They use, for their propagand, the same good old manipulations technics over technology, as religion are used to manipulate people. Same good old technics. Same results.

Look at how humans can become violent went attacking their gods, it's the same in the hacktivist scene with the technological self-proclamed prophets.

It's all nazi military instrumentalization. Nothing more, nothing less

@stman @uranther Looking back, it was unbelievable to see how huge the storm caused by Intel's "processor serial number" in Pentium 3 was, that even forced Intel to withdrew it. Meanwhile, nobody has ever said anything about the serial numbers of hard drives, GPUs, motherboards, RAM modules, Ethernet MAC address, etc, etc, etc. Pretty illogical, isn't it?

@niconiconi @uranther Yep. They withdraw it officially. I’m sure undocumented ones exist. About all subsystems perpherals serial numbers : My article CIA forced me to unpublished focussed mainly on that. There are at least 30 unerasable / unmaskable / unchangeable serial numbers in a standard PC motherboard IC’s and subsystems. Mac address is the only one that is garanteed to be editable because stored in an EEPROM or Flash in most ethernet controllers. That’s no

@niconiconi @uranther no surprise it was the only one realky advertized by our beloved nazi technological prophets. It has clearly been used as a diversion to mask all the others in our systems.

Then, there are other kind of « indirect » serial numbers : Processors speed, systems speed. All systems integrated circuits never run at the same speed. It one can measure precisely the effective speed of a CPU, it becomes a unique fingerprint.

Same for most subsystems then...

@stman @uranther
> one can measure precisely the [X], it becomes a unique fingerprint.

It remind me of those security papers from the early days of Tor, on how measuring the thermal drift of crystal oscillators via visible server time could potentially be used to fingerprint an onion service, or even deduce the approximate timezone or latitude.

If the academic community could go this far, no wonder, there must have been lots of more unpublished techniques discovered by the NSA in the past 10 years...

@niconiconi @uranther Many of these fingerprints can only be fighted by re-engineering completely all the technical architectures of computers and microprocessors. For many other reasons, I am convinced most of currebt architectures in digital systems are obsolete. In this field, progress has only be done by always adding many new features and layers, but the core architectures never really changed : A microprocessor and a microprocessor based system are still highly

@niconiconi @uranther centralized concepts and designs. CPU - CENTRAL processing unit - stands for itself. In terms of security model, it inherits from these core centralized concepts, generating other ridiculously centralized and outdated concepts like PMMU/MMU, which is realky a good example : A single zero day exploited into a kernel (Meaning some code running in priviledged mode in a microprocessor) leading to arbitrary code execution in the same mode and the whole

@niconiconi @uranther security model is down : The attacker can modify PMMU/ MMU registers, modify PMMU/MMU pages trees, and your whole system is definitely persistently compromized.

This is why cyber-security now-a-day really makes me laugh : It is the highest degree of stupidity and masochism, were most folks just refuse to see that most issues come from those outdated core architectures. But still, sale folks continue to add new layers, new stuff, rising complexity,

@niconiconi @uranther and in the end bringing more new holes in the system leading to further more cybersecurity issues. It’s a self maintaining sado-masochist chain reaction, and it’s really like folks were completely brainwashed refusing to see that just by reengineer core architectures from scratch, avoiding those outdated centralized concepts, and enforcing kiss design approaches, most of the issues can be solved.

More than ever, those ugly nazi « religious »

@niconiconi @uranther manipulation technics that all our war mongers nazi military love to exploit are more than ever present. The new young generations of engineers and hackers are completely manipulated by those « religious » propagand and mind formatting technics to a point that is hard to believe :

β€’ Day 1, god created the X86 CPU concept and computers based on its image.
β€’ Day 2, god created centralized telecommunication networks and TCP/IP

@niconiconi @uranther
β€’ Day 3, god creates the kernel concept (centralized, again), inherited by the 2 first concepts also fully centralized.

Most folks never think to te-enginnee those 3 basic outdated centralized concepts from which all the shit we use today, these thousands layers all competing between each other in complexity, inherited, like a disastrous nazi rooted fractal in terms of cyber-power model.

Only true crypto-anarchists purge their creative and

@niconiconi @uranther independent minds from all those artificial boundaries and design and say « hey, we are going to re-think day 1, 2 and 3 » with mind blowing new approaches and concepts. We shall not loose time fixing outdated centralized (nazi) concepts and architectures that forged the whole overall nazi technology stack as we suffer from it today.

And the best way to reinvent everything is according to me to master the unique relationship that do exist between

@niconiconi @uranther architectural choices, in any known technological layers, and the corresponding kind of cyber-power is creates.

It is also a matter of blowing all those artificial boundaries that we all refer stupidely to : Hardware, Software, Os, Protocols, etc... alk these boundaries just don’t exist, only in our mind indeed, and their daily usage is a fucking self manipulation preventing folks from thinking that all the shit we endure today, all this

@niconiconi @uranther ineluctable rising fascism and nazism is the only fucking deterministic consequence of what those « nazi digital religion makers » who formatted our minds with fascist centralized concepts of day 1, 2 and 3 detailed earlier with the same force as with capitalism and consumerism.

Wanna save the world from nazism and fascism, and also capitalism ?

Free your mind, and fucking start thinking reengineering day 1, 2, 3’s concepts with new disruptive

@niconiconi @uranther This is to me from far the best definition of crypto-anarchism.

There will be no change and no revolution until we master this way of designing a new cyberspace architecture, with all the architectures of the underlying stuff supporting it.

« Architecture is Law » !

@niconiconi @uranther decentralized concepts, getting rid of all known boundaries and layers concepts as we know them, in all fields.

There has never been any boundary between hardware, software, protocols : everything is architecture, state machines.

But this time, let’s rethink everything with mastered kiss and cyber-power model driven approaches, and anticipate and watch the deterministic effect of all new things that will be developing upon those new initial core architectures.

@niconiconi @uranther Even any display monitor (VGA, DVI/HDMI) transfers a serial number to the GPU, reporting it to the APCI and the OS, it’s the VESA standard... Serial numbers are everywhere in digital systems. So do indirect Fingerprints too.

@niconiconi @uranther I remember seeing, while working on the NSA observer project with a few hackers, a slide in a Snowden leaked document, were I could see a dump of a table of an internal database of NSA, and I saw a column called « serial numberΒ Β». Nobody paid attention to this. After all it was just a small text of two words in one slide of the hundred thousands revealed by snowden. It’s when I saw that that I decided to study seriously active fingerprinting technic

@niconiconi @stman @uranther I am so glad I am not the only one to remember the PIII serial thing. Never forget. Lol

Sign in to participate in the conversation

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!