BTC $59831.0676
ETH $3015.4573
BNB $566.4599
SOL $140.9834
XRP $0.5220
stETH $3005.3363
DOGE $0.1350
TON $5.3168
ADA $0.4610
AVAX $34.1621
TRX $0.1228
wstETH $3513.7983
DOT $7.2084
WETH $3015.9473
WBTC $59803.6422
BCH $438.9622
LINK $13.6917
MATIC $0.7220
UNI $7.1335
ICP $13.3736
LTC $80.8834
DAI $1.0004
IMX $2.2476
FDUSD $1.0022
CAKE $2.5561
RNDR $7.8325
NEAR $6.3289
ETC $26.0608
HBAR $0.1037
PEPE $0.0000
MNT $0.9999
FIL $5.9394
STX $2.1190
OKB $49.2303
ATOM $8.6578
WIF $2.8221
TAO $406.7622
VET $0.0354
MKR $2777.1963
KAS $0.1070
GRT $0.2542
USDE $0.9989
XMR $122.8785
FET $2.0407
XLM $0.1108
AR $34.0444
INJ $23.6785
BTC $59831.0676
ETH $3015.4573
BNB $566.4599
SOL $140.9834
XRP $0.5220
stETH $3005.3363
DOGE $0.1350
TON $5.3168
ADA $0.4610
AVAX $34.1621
TRX $0.1228
wstETH $3513.7983
DOT $7.2084
WETH $3015.9473
WBTC $59803.6422
BCH $438.9622
LINK $13.6917
MATIC $0.7220
UNI $7.1335
ICP $13.3736
LTC $80.8834
DAI $1.0004
IMX $2.2476
FDUSD $1.0022
CAKE $2.5561
RNDR $7.8325
NEAR $6.3289
ETC $26.0608
HBAR $0.1037
PEPE $0.0000
MNT $0.9999
FIL $5.9394
STX $2.1190
OKB $49.2303
ATOM $8.6578
WIF $2.8221
TAO $406.7622
VET $0.0354
MKR $2777.1963
KAS $0.1070
GRT $0.2542
USDE $0.9989
XMR $122.8785
FET $2.0407
XLM $0.1108
AR $34.0444
INJ $23.6785
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Intel Alder Lake processor source code leaked online


    The leak could have occurred at the partners of the company

    The day before, several sources reported that the source code for Intel Alder Lake processors appeared on the Web. The data is written to a 2.8 GB file.

    The leaked archive contains hundreds of engineering and technical files, as well as documentation and tools for creating BIOS / UEFI firmware for the Intel Alder Lake platform and chipsets for 12 generation processors. The source of the data remains unknown, but one document mentions Lenovo.

    Even if the authenticity of the data is confirmed, it is not yet clear whether sensitive information can be used to develop exploits, especially if they are not obtained directly from Intel, but from a third-party source.

    Similar materials are likely to be available from most motherboard manufacturers and OEM partners, and Intel should remove potentially problematic fragments from the dataset before sending sources to third-party vendors.

    It is not yet known how this leak will actually turn out for the company. Of course, Alder Lake is already fading into the background, because Intel has implemented all its secret developments in the latest generation of chips. However, Alder Lake and Raptor Lake are architecturally similar, so revealing the source code of the 12th generation can reveal most of the secrets of the 13th series - including "showing" security holes.

    Author DeepWeb
    The US government said what Chinese hackers have been using to attack critical US infrastructure since 2020
    The head of the German cybersecurity service may be fired due to ties with the Russian Federation

    Comments 0

    Add comment