>
"Massive Culling" Imminent For Alt Managers, Soros Fund CEO Warns
56% Of Americans Now Suspect COVID-19 'Vaccines' Caused Mass-Deaths
"Negotiations Underway": Cuban President Acknowledges U.S. Talks Amid Fuel Supply Crisis
META Delays AI Rollout Because It Sucks, May License Gemini;
Human Brain Cells Merge With Silica To Play DOOM
Will Yann LeCun Provide The Next Breakthrough In AI?
Human Brain Cells Merge With Silica To Play DOOM
Solar And Storage Could Reshape Rural Electricity Markets
With World Seemingly At War, DARPA Finds Time To Unveil The X-76
The world's first diesel plug-in hybrid pickup truck is here
US advances nuclear revival with approval of Natrium Gen IV reactor
Your Contractor Doesn't Want Me To Show You This!
CEO of Blacklisted AI Company Anthropic, Dario Amodei Says His AI Models 'May Have Gained...

Now imagine a backdoor planted not in an application, or deep in an operating system, but even deeper, in the hardware of the processor that runs a computer. And now imagine that silicon backdoor is invisible not only to the computer's software, but even to the chip's designer, who has no idea that it was added by the chip's manufacturer, likely in some farflung Chinese factory. And that it's a single component hidden among hundreds of millions or billions. And that each one of those components is less than a thousandth of the width of a human hair.
In fact, researchers at the University of Michigan haven't just imagined that computer security nightmare; they've built and proved it works. In a study that won the "best paper" award at last week's IEEE Symposium on Privacy and Security, they detailed the creation of an insidious, microscopic hardware backdoor proof-of-concept. And they showed that by running a series of seemingly innocuous commands on their minutely sabotaged processor, a hacker could reliably trigger a feature of the chip that gives them full access to the operating system. Most disturbingly, they write, that microscopic hardware backdoor wouldn't be caught by practically any modern method of hardware security analysis, and could be planted by a single employee of a chip factory.