
Mark Ermolov
@_markel___
I research security of Intel platforms. I don't work for Intel
ID: 2816591352
18-09-2014 08:25:56
1,1K Tweet
11,11K Followers
130 Following




Mark Ermolov found a new way to fully exploit patched Intel flaws (CVE-2017-5705, etc.), enabling stealthy spyware implants via supply chain attacks. Affected: Intel Pentium, Celeron, and Atom (Denverton, Apollo/Gemini Lake). Intel dismissed the issue: global.ptsecurity.com/about/news/pt-…





Looks like this Timesys is now Lynx! Corporation did an amazing job [SARCASM] selling their Timesys Kernel Hardening Analysis Tool that simply provides the recommendations from my open source project kernel-hardening-checker. They don't even mention kernel-hardening-checker. Shame on them👎
![Alexander Popov (@a13xp0p0v) on Twitter photo Looks like this <a href="/Timesys/">Timesys is now Lynx!</a> Corporation did an amazing job [SARCASM] selling their Timesys Kernel Hardening Analysis Tool that simply provides the recommendations from my open source project kernel-hardening-checker.
They don't even mention kernel-hardening-checker. Shame on them👎 Looks like this <a href="/Timesys/">Timesys is now Lynx!</a> Corporation did an amazing job [SARCASM] selling their Timesys Kernel Hardening Analysis Tool that simply provides the recommendations from my open source project kernel-hardening-checker.
They don't even mention kernel-hardening-checker. Shame on them👎](https://pbs.twimg.com/media/GsWOdMOXcAA82Hr.jpg)

