popularresistance.org says: New Intel Chips Contain Back-Door Processor, Hackable Even When Computer is Turned Off

badbios „Throw away your computer“

Julian Assange kept changing hardware for not beeing tracked.

What use is it to install a secure operating system, if your system is already infected with malicious code right after the start of the BIOS?

It is possible for ANY PCI, ISA, PCI-E Device to take full control over all resources during startup.

Therefore it’s also possible for an infected device to load malicious code via internet, every time it starts… leaving no trace on the harddisk, making it impossible for AntiVirus to detect.

Welcome to BAD BIOS 😀 *Muhahahahahahahaha…* (evil laughter of secret agent with hall and fading out)

Jonathan Brossard: „Hardware backdooring is practical“ – Security Research Engineer & CEO, Toucan System, France and Australia

toucan system black hat 2012
Blackhat Briefings and Defcon conferences, Las Vegas, 2012



another nice pdf: http://2012.hackitoergosum.org/blog/wp-content/uploads/2012/04/HES-2012-jbrossard_fdemetrescu-Hardware-Backdooring-is-pratical.pdf

Search: https://startpage.com/do/search?q=Rakshasal+backdoor&l=deutsc


Dr Mathias Wagner http://www.nxp.com/countries/germany.html

Chief Security Technologist bei NXP Semiconductors Germany GmbH



Stealthy Dopant Level Hardware Trojans

Georg T. Becker, Francesco Regazzoni, Christof Paar, and Wayne P. Burleson
University of Massachusetts Amherst, USA TU Delft, The Netherlands and ALaRI
– University of Lugano , Switzerland
Horst Görtz Instistut for IT Security, Ruhr Universität Bochum, Germany
hardware trojans


„Trojan horse disguised in an MP3 file played on the vehicle’s entertainment system“
Source: http://blog.nxp.com/connected-cars-automotive-security-needs-to-shift-into-top-gear/