Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Friday August 07 2020, @03:04PM   Printer-friendly
from the more-intel-on-Intel dept.

Massive 20GB Intel IP Data Breach Floods the Internet, Mentions Backdoors (archive)

A leaker today posted on Twitter a link to a file sharing service that contains what an anonymous source claims is a portion of Intel's crown jewels: A 20GB folder of confidential Intel intellectual property. The leaker dubbed the release the "Intel exconfidential Lake Platform Release ;)."

[...] The folder has been posted by an anonymous source that claims more is coming soon, and while we don't know the exact specifics of the folder's contents, we have verified that it does exist. In fact, the title of many of the documents do correlate to the list of purported information posted by the leaker:

  • Intel ME Bringup guides + (flash) tooling + samples for various platforms
  • Kabylake (Purley Platform) BIOS Reference Code and Sample Code + Initialization code (some of it as exported git repos with full history)
  • Intel CEFDK (Consumer Electronics Firmware Development Kit (Bootloader stuff)) SOURCES
  • Silicon / FSP source code packages for various platforms
  • Various Intel Development and Debugging Tools
  • Simics Simulation for Rocket Lake S and potentially other platforms
  • Various roadmaps and other documents
  • Binaries for Camera drivers Intel made for SpaceX
  • Schematics, Docs, Tools + Firmware for the unreleased Tiger Lake platform
  • (very horrible) Kabylake FDK training videos
  • Intel Trace Hub + decoder files for various Intel ME versions
  • Elkhart Lake Silicon Reference and Platform Sample Code
  • Some Verilog stuff for various Xeon Platforms, unsure what it is exactly.
  • Debug BIOS/TXE builds for various Platforms
  • Bootguard SDK (encrypted zip)
  • Intel Snowridge / Snowfish Process Simulator ADK
  • Various schematics
  • Intel Marketing Material Templates (InDesign)
  • Lots of other things

[...] The poster encourages downloaders to look for mentions of 'backdoors' in some of the Intel source code, and even provides a sample clip of one such listing, but we aren't sure of the intentions behind the listings in the code.

The source appears to be an employee of Intel or a company partnered with Intel. The roadmaps alone could be a big deal depending on how detailed they are. Some of this information could be relevant to a recent class-action lawsuit over "7nm" delays.

Also at AnandTech, Wccftech, AdoredTV, Ars Technica, and ZDNet.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Informative) by EvilSS on Friday August 07 2020, @04:05PM (3 children)

    by EvilSS (1456) Subscriber Badge on Friday August 07 2020, @04:05PM (#1032961)
    This leak is from Intel's partner/customer portal: "The information appears to come from the Intel Resource and Design Center, which hosts information for use by our customers, partners and other external parties who have registered for access. " so not from some internal secret trove, just partner NDA stuff. As for back doors, "Hey, everyone look for backdoors in the code", while technically true, they did "mention" it, is like "hey, everyone look for aliens in the code" and adding "mentions aliens" in the headline. No way any real covert backdoors would show up in documents and code released to partners and customers.
    Starting Score:    1  point
    Moderation   +3  
       Interesting=1, Informative=2, Total=3
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 2) by takyon on Friday August 07 2020, @04:10PM

    by takyon (881) <reversethis-{gro ... s} {ta} {noykat}> on Friday August 07 2020, @04:10PM (#1032966) Journal

    Probably true, but there's more of these dumps to come.

    --
    [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
  • (Score: 0) by Anonymous Coward on Friday August 07 2020, @07:06PM (1 child)

    by Anonymous Coward on Friday August 07 2020, @07:06PM (#1033096)

    No way any real covert backdoors would show up in documents and code released to partners and customers.

    Are overt backdoors any better from a prey end user's point of view?

    • (Score: 3, Insightful) by EvilSS on Friday August 07 2020, @08:08PM

      by EvilSS (1456) Subscriber Badge on Friday August 07 2020, @08:08PM (#1033123)
      Yes, at least the ones you are told about you can try to mitigate. There is a big difference between a documented feature that can be used as a backdoor, and a covert backdoor put in place for governments. My house has 4 doors I know about and can use. I'd be pretty damn pissed to find out it also had a secret 5th door that the government had a key to.