航空航天港

 找回密码
 注册会员

QQ登录

只需一步,快速开始

查看: 5876|回复: 72
收起左侧

自主芯片专项

  [复制链接]
头像被屏蔽
空弹匣 发表于 2015-11-24 12:52 | 显示全部楼层 |阅读模式
提示: 作者被禁止或删除 内容自动屏蔽
gleamliuxin 发表于 2015-11-24 13:55 | 显示全部楼层
思路正确!未来是手机芯片的天下,台式机会消失于消费领域。这是我们赶超因特尔的机会。
fengqiuyizhong 发表于 2015-11-24 14:49 | 显示全部楼层
gleamliuxin 发表于 2015-11-24 13:55
思路正确!未来是手机芯片的天下,台式机会消失于消费领域。这是我们赶超因特尔的机会。

扯~这都能想
回复 支持 1 反对 0

使用道具 举报

gleamliuxin 发表于 2015-12-2 11:21 | 显示全部楼层

那你拿出干货来打脸啊~你不是连想都不敢想吧~
fengqiuyizhong 发表于 2015-12-2 13:44 | 显示全部楼层
gleamliuxin 发表于 2015-12-2 11:21
那你拿出干货来打脸啊~你不是连想都不敢想吧~

性能差太多
gleamliuxin 发表于 2015-12-4 20:15 | 显示全部楼层

我又没说现在就能顶用甚至超越!就好像网络代替书信,总是要一个过程。
头像被屏蔽
 楼主| 空弹匣 发表于 2015-12-9 16:17 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
fengqiuyizhong 发表于 2015-12-11 17:16 | 显示全部楼层
gleamliuxin 发表于 2015-12-4 20:15
我又没说现在就能顶用甚至超越!就好像网络代替书信,总是要一个过程。

没有可比性······你要说芯片代替算盘还好,手机芯片怎么代替电脑芯片,再怎么发展电脑芯片也在发展来着,体积散热在那放着呢,性能怎么也比不上
gleamliuxin 发表于 2015-12-12 19:36 | 显示全部楼层
fengqiuyizhong 发表于 2015-12-11 17:16
没有可比性······你要说芯片代替算盘还好,手机芯片怎么代替电脑芯片,再怎么发展电脑芯片也在发展 ...

最开始计算机也是比不过算盘的~~~好了,到此为止,咱俩别抬杠了,等10年20年的再看结果吧~
头像被屏蔽
 楼主| 空弹匣 发表于 2016-6-16 16:53 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
头像被屏蔽
 楼主| 空弹匣 发表于 2016-6-21 18:08 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
头像被屏蔽
 楼主| 空弹匣 发表于 2016-6-21 18:10 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
zmic 发表于 2016-6-21 22:10 | 显示全部楼层
   神经网络处理器应该还有很长的路要走,卡斯帕洛夫和深蓝,对比下能耗和重量就知道了
头像被屏蔽
 楼主| 空弹匣 发表于 2016-6-23 09:49 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
头像被屏蔽
 楼主| 空弹匣 发表于 2016-7-27 11:33 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
头像被屏蔽
 楼主| 空弹匣 发表于 2016-8-2 11:01 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
头像被屏蔽
 楼主| 空弹匣 发表于 2016-8-12 08:58 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
i2000s1 发表于 2016-8-14 13:25 | 显示全部楼层
外围消息:
转自:https://arstechnica.co.uk/security/2016/08/microsoft-secure-boot-firmware-snafu-leaks-golden-key/
大意:有研究人员破译了微软安装在安全系统启动中的后门程序,结果发现其设计有很大漏洞,一旦攻破将难以用打补丁的办法恢复其安全防护的功能。黑客可以绕过安全系统启动的门槛,使用任意自定义的操作系统启动计算机并查看硬盘内文件。

Secure Boot snafu: Microsoft leaks backdoor key, firmware flung wide open
Microsoft quiet as researchers spot debug mode flaw that bypasses OS checks.

TOM MENDELSOHN (UK) - 8/11/2016, 6:57 AM

131
Updated, August 12: Microsoft has now responded to the Secure Boot blooper.

The company said: "The jailbreak technique described in the researchers’ report on August 10 does not apply to desktop or enterprise PC systems. It requires physical access and administrator rights to ARM and RT devices and does not compromise encryption protections."

Original Story

Microsoft has inadvertently demonstrated the intrinsic security problem of including a universal backdoor in its software after it accidentally leaked its so-called "golden key"—which allows users to unlock any device that's supposedly protected by Secure Boot, such as phones and tablets.

The key basically allows anyone to bypass the provisions Microsoft has put in place ostensibly to prevent malicious versions of Windows from being installed, on any device running Windows 8.1 and upwards with Secure Boot enabled.

And while this means that enterprising users will be able to install any operating system—Linux, for instance—on their Windows tablet, it also allows bad actors with physical access to a machine to install bootkits and rootkits at deep levels. Worse, according to the security researchers who found the keys, this is a decision Microsoft may be unable to reverse.

The golden keys were found by MY123 and Slipstream in March this year. They've just posted, on a rather funky website, a description both of Microsoft's security errors and of its seeming reluctance to patch the issue. The researchers note that this snafu is a real-world demonstration of the lack of wisdom in the FBI's recent demands for universal backdoors in Apple's devices. They wrote:

A backdoor, which MS put in to Secure Boot because they decided to not let the user turn it off in certain devices, allows for Secure Boot to be disabled everywhere! You can see the irony. Also the irony in that MS themselves provided us several nice "golden keys" (as the FBI would say) ;) for us to use for that purpose
About the FBI: are you reading this? If you are, then this is a perfect real world example about why your idea of backdooring cryptosystems with a "secure golden key" is very bad! Smarter people than me have been telling this to you for so long, it seems you have your fingers in your ears.

You seriously don't understand still? Microsoft implemented a "secure golden key" system. And the golden keys got released from MS['s] own stupidity. Now, what happens if you tell everyone to make a "secure golden key" system? Hopefully you can add 2+2...
The researchers seem to have found the golden key—which isn't a PKI-type private key you would use to sign binaries, but rather a way to alter the tasks executed by UEFI at boot—bundled in dormant form on retail devices, left in as a debugging tool by accident. Now apparently available online, it should allow any user to turn off Secure Boot.

FURTHER READING
Most software already has a “golden key” backdoor—it’s called auto update
Secure Boot works at the firmware level, and is designed only to allow an operating system signed with a key certified by Microsoft to load. It can be disabled on many desktops, but on most other Windows devices, it's hard-coded in. The golden key policy seems to have been designed for internal debugging purposes, to allow OS signature checks to be disabled, apparently so programmers can test new builds. In practice, it could well open up Microsoft's tablets and phones to serious attacks.
At first, Microsoft apparently dismissed the find as a non-issue, before changing its mind, and then slowly applying a patch. The software giant eventually awarded a bug bounty in June, and has since released two patches—MS16-094 and MS16-100—with a third on the way. It's understood that none of them are able to directly shut the back door, and there's a distinct possibility that the hole opened by the golden keys may not be truly closable.

According to the researchers, "it'd be impossible in practise for MS to revoke every bootmgr earlier than a certain point, as they'd break install media, recovery partitions, backups, etc."

FURTHER READING
What the US government should’ve learned about backdoors from the Clipper Chip
In February, in the wake of the San Bernardino shootings in the US, the FBI asked Apple to introduce backdoors into its products, after it had proved difficult to access information on an iPhone belonging to one of the shooters. In a statement, Apple CEO Tim Cook wrote:
We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.
Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software—which does not exist today—would have the potential to unlock any iPhone in someone's physical possession.

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.
Ars has sought comment from Microsoft.

This story was updated on August 11 to clarify the nature of the "golden key," which isn't technically a key at all.
头像被屏蔽
 楼主| 空弹匣 发表于 2016-11-27 15:56 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
头像被屏蔽
 楼主| 空弹匣 发表于 2017-1-9 13:21 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
您需要登录后才可以回帖 登录 | 注册会员

本版积分规则

QQ|申请友链|旗下论坛|小黑屋|手机版|航空航天港 ( 豫ICP备12024513号 )

GMT+8, 2018-6-21 00:46 , Processed in 0.388897 second(s), 22 queries , Gzip On.

Powered by Discuz! X3.2

© 2001-2013 Comsenz Inc.

快速回复 返回顶部 返回列表