written by Bruce Schneier. added about 1 year ago by @icyflame ARCHIVES
First, attacks against hardware, as opposed to software, will become more common. Last fall, vulnerabilities were discovered in Intel's Management Engine, a remote-administration feature on its microprocessors. Like Spectre and Meltdown, they affected how the chips operate. Looking for vulnerabilities on computer chips is new. Now that researchers know this is a fruitful area to explore, security researchers, foreign intelligence agencies, and criminals will be on the hunt.
Cutouts is an open source application. Code licensed under the MIT license. Copyright 2018 Siddharth Kannan