272-Processor Attacks Explained

This week Paul Asadoorian joins me to explain vulnerabilities within our computer processors with potential solutions. Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and  Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free. Listen to PAST episodes at https://inteltechniques.com/podcast.html SHOW NOTES: INTRO: None NEWS & UPDATES: https://inteltechniques.com/tools/ https://inteltechniques.com/workbook.html https://unredactedmagazine.com/ PROCESSOR ATTACKS EXPLAINED: Paul Asadoorian https://twitter.com/securityweekly https://eclypsium.com/2022/07/26/firmware-security-realizations-part-1-secure-boot-and-dbx/ https://github.com/mjg59/mei-amt-check https://github.com/chipsec/chipsec.git https://github.com/intel/INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools https://github.com/ptresearch/mmdetect https://github.com/corna/me_cleaner/ Free Guides: https://inteltechniques.com/links.html Affiliate Links: Extreme Privacy (4th): https://amzn.to/3D6aiXp ProtonMail: https://go.getproton.me/aff_c?offer_id=7&aff_id=1519 ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=277 PIA Dedicated IP VPN: https://www.privateinternetaccess.com/ThePSOSHOW SimpleLogin Masked Email: https://simplelogin.io?slref=osint Silent Pocket Bags & Wallets: https://slnt.com/discount/IntelTechniques

2356 232

Suggested Podcasts

Crooked Media

Michael Cazayoux

Major Spoilers Podcast Network

RESELLER WEEKLY - CHASING CARDBOARD PODCAST

Yogesh Prajapati