Intel Is Stockpiling Legacy Technology For Security Research (wsj.com) 43
James Rundle writes via the Wall Street Journal: A few years ago, executives at Intel began to realize they had a problem. The company was making dozens of new products each year, from chips to software platforms, but it didn't have a formal method for cataloging and storing older technology so engineers could test it for security flaws. [...] Intel's answer to this conundrum was to create a warehouse and laboratory in Costa Rica, where the company already had a research-and-development lab, to store the breadth of its technology and make the devices available for remote testing. After planning began in mid-2018, the Long-Term Retention Lab was up and running in the second half of 2019. The lab gives Intel, which is based in Santa Clara, Calif., and has more than 100,000 employees, a centralized, secure location where security tests can be run from anywhere in the world. Access to the building is strictly controlled and approved by senior managers, while surveillance cameras watch the equipment at all times. Even its location is secret -- Intel representatives declined to say where exactly it is.
The lab brings commercial value to Intel, [said Mohsen Fazlian, general manager of Intel's product assurance and security unit.], citing company research that shows customers are more likely to buy technology from manufacturers that proactively test their products. [...] The lab has changed Intel's product development. All new technology is now built with the facility in mind, with technical documentation created to allow engineers to support it for up to 10 years, and units are sent to the lab before they are released, Mr. Fazlian said. "Hopefully, I will never find myself searching eBay for Intel hardware again," he said.
The lab brings commercial value to Intel, [said Mohsen Fazlian, general manager of Intel's product assurance and security unit.], citing company research that shows customers are more likely to buy technology from manufacturers that proactively test their products. [...] The lab has changed Intel's product development. All new technology is now built with the facility in mind, with technical documentation created to allow engineers to support it for up to 10 years, and units are sent to the lab before they are released, Mr. Fazlian said. "Hopefully, I will never find myself searching eBay for Intel hardware again," he said.
I thought it's already obvious to anyone (Score:5, Funny)
Re: (Score:3)
I think they'll stay fairly cool-headed.
Re: (Score:1)
Seeing how much watts these new ones consume, I kinda doubt it. ;) Depends on how high is "fairly cool".
Re: (Score:2)
That is not funny.
Really? I laughed at it. Maybe you should lighten up.
Hopefully they have a backup (Score:1)
One volcano/earthquake/hurricane/asteroid/nuke in the wrong place could wipe this out.
Let's hope they have spare parts somewhere else so they could re-build this if it gets knocked out.
Re: (Score:2)
If they get smacked with a nuke in Costa Rica, "it security" is going to be very low on anyone's priority list. Somewhere around "having a correct type of anal dildo to pleasure my pet duck during nuclear winter" level of priority.
Re: (Score:2)
Technically wrong (Score:2)
Seems accurate though.
Though technically wrong.
(Turning the "bio scientist nerd nit-picking" dial to 11...)
having a correct type of anal dildo to pleasure my pet duck during nuclear winter
...except that birds don't have a separate anus. They have a single hole (cloaca), So "cloacal dildo" would have been more correct.
(Though unlike most other birds, male ducks do have a phallus).
(And try to not think too much about coerced reproduction in ducks).
Re: (Score:1)
Funny part is is the exact reason why I made the point about anal dildo. Anal openings tend to be very poorly suited for penetrative entry in most species, which is why ducks have that weirdly shaped, very soft penis and their reproductive organs separate from cloaca quite early. And if you ever looked at that specific piece of anatomy, that would actually be rather difficult to hit without that very specifically shaped object. Because it's the intestinal pathway that goes straight from the opening in the d
My back room is the backup (Score:2)
When I read a bunch of old technology for security testing, yo me that sounds like my back room. Heck, I still have a variety of SCSI cables and adapters; Intel is saying "up to ten years".
One post on Slashdot will find you anything Intel has made in the last ten years (or 30).
Re: (Score:2)
./ is using an Intel logo more than a year old. (Score:2)
That is all.
Re: (Score:1)
How appropriate.
what about MB and other parts needed to run (Score:2)
what about MB and other parts needed to run that hardware?
Intel has boards to run CPUs on (Score:2)
In short Intel probably has all the technology and expertise necessary for something to run the CPU on. Maybe
Re: (Score:2)
Re: (Score:2)
Then again we are talking about going from one Intel CPU to another so the cost is really that of an incremental port. The previous version of the software probably already runs on the hardware, or is very close to doing so, so the real effort is to test something new or
Oxymoron? (Score:5, Interesting)
Somehow, "a centralized, secure location" and "where security tests can be run from anywhere in the world" don't exactly strike me as phrases that belong in the same sentence when it comes to IT.
As long as you MAINTAIN the VPN/jumpbox, no secret (Score:3)
I'm a picky security professional. While certainly the design would require attention to security, I think it's perfectly doable. There are two main points I'd watch out for.
The one and only internet-accessible device would be a hardened VPN endpoint and minimal jumpbox. That's the part that has to be secure. Which means that system has to be maintained, getting security patches and VPN config updates as needed.
Spanned with the inside interface of the VPN would be an IDS recording and analyzing all traffic
Re: (Score:2)
Re: As long as you MAINTAIN the VPN/jumpbox, no se (Score:2)
"you could never really trust that machine, right?"
That's exactly the "mitigation". You don't trust it. :)
Much like any machine running Windows.
But seriously, you don't trust JavaScript on random web pages, right? You use the JavaScript to play the game or whatever on the web page; you don't trust it.
If the bad guy owns the BIOS, the bad guy owns the machine. So it's the bad guy's machine. Just like any random web server you might use - it's presumably been compromised by a bad guy. Which means I use the S
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
They mean physically secure, so that the parts won't be stolen and won't be destroyed by a fire.
I am stunned it took them this long (Score:2)
Marcel Cortes Beer, a manager at the lab, said it gets about 1,000 requests a month to build equipment for remote security tests, and 50 new devices come in weekly.
I am amaz
What security research? (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
It's sad if their docs have gotten worse. I remember working with AMD64 back in the day, and Intel's docs were great. Well documented technology is so much nicer to work with.
Re: (Score:2)
Re: (Score:2)
Security problems in legacy chips (Score:2)
That's easy, Intel can just point to any of the processors they've made in ages and say "and there's another processor where we deliberately compromised security to get a leg up on AMD."
So Helpful! (Score:2)
The lab brings commercial value to Intel, [said Mohsen Fazlian, general manager of Intel's product assurance and security unit.], citing company research that shows customers are more likely to buy technology from manufacturers that proactively test their products.
Given we are talking about large micro processors, network and storage controllers, and chipset products here which generally can't be just be swapped for contemporary replacements this seems rather self serving to me. If you find a vulnerability in these things your options are basically; replace it and probably most of the machine around it at the same time; disable the affected features which is often so crippling you'll want to replace it anyway; or ignore the issue and hope for the best. This isn't lik
Really? (Score:2)
A company thinks 10 years ahead?
Call me shocked!
secret, secure location? (Score:2)
It's in Costa Rica, I'm sure a few satellite images will sort it out. You also know damn well that their competitors know where it is and most likely China and US authorities too.