Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Intel Hardware Technology

Intel Is Stockpiling Legacy Technology For Security Research (wsj.com) 43

James Rundle writes via the Wall Street Journal: A few years ago, executives at Intel began to realize they had a problem. The company was making dozens of new products each year, from chips to software platforms, but it didn't have a formal method for cataloging and storing older technology so engineers could test it for security flaws. [...] Intel's answer to this conundrum was to create a warehouse and laboratory in Costa Rica, where the company already had a research-and-development lab, to store the breadth of its technology and make the devices available for remote testing. After planning began in mid-2018, the Long-Term Retention Lab was up and running in the second half of 2019. The lab gives Intel, which is based in Santa Clara, Calif., and has more than 100,000 employees, a centralized, secure location where security tests can be run from anywhere in the world. Access to the building is strictly controlled and approved by senior managers, while surveillance cameras watch the equipment at all times. Even its location is secret -- Intel representatives declined to say where exactly it is.

The lab brings commercial value to Intel, [said Mohsen Fazlian, general manager of Intel's product assurance and security unit.], citing company research that shows customers are more likely to buy technology from manufacturers that proactively test their products. [...] The lab has changed Intel's product development. All new technology is now built with the facility in mind, with technical documentation created to allow engineers to support it for up to 10 years, and units are sent to the lab before they are released, Mr. Fazlian said. "Hopefully, I will never find myself searching eBay for Intel hardware again," he said.

This discussion has been archived. No new comments can be posted.

Intel Is Stockpiling Legacy Technology For Security Research

Comments Filter:
  • by Pierre Pants ( 6554598 ) on Monday November 29, 2021 @08:34PM (#62031983)
    that they're stockpiling legacy technology. The majority of their CPUs are still 14nm.
  • One volcano/earthquake/hurricane/asteroid/nuke in the wrong place could wipe this out.

    Let's hope they have spare parts somewhere else so they could re-build this if it gets knocked out.

    • by Luckyo ( 1726890 )

      If they get smacked with a nuke in Costa Rica, "it security" is going to be very low on anyone's priority list. Somewhere around "having a correct type of anal dildo to pleasure my pet duck during nuclear winter" level of priority.

    • When I read a bunch of old technology for security testing, yo me that sounds like my back room. Heck, I still have a variety of SCSI cables and adapters; Intel is saying "up to ten years".

      One post on Slashdot will find you anything Intel has made in the last ten years (or 30).

  • what about MB and other parts needed to run that hardware?

    • Intel used to make consumer motherboards. I believed they continued to make some motherboards for corporate customers. At a minimum they would have development boards used for testing CPUs during development. You can think of these boards as something akin to an Arduino, or the development boards of microcontrollers for embedded environments. Intel may also offer reference PC motherboard designs.

      In short Intel probably has all the technology and expertise necessary for something to run the CPU on. Maybe
      • I don't think Intel would be running Windows in this application anyway. It's more likely to be Linux or another *NIX-like
        • by drnb ( 2434720 )
          Yeah, I expect FreeRTOS, Embedded Linux and Desktop/Server Linux would be up and running before Windows. More so Desktop Linux if they also want to test the integrated GPUs. FreeRTOS would probably be fine for testing ethernet, USB, etc.

          Then again we are talking about going from one Intel CPU to another so the cost is really that of an incremental port. The previous version of the software probably already runs on the hardware, or is very close to doing so, so the real effort is to test something new or
  • Oxymoron? (Score:5, Interesting)

    by AJWM ( 19027 ) on Monday November 29, 2021 @10:55PM (#62032273) Homepage

    Somehow, "a centralized, secure location" and "where security tests can be run from anywhere in the world" don't exactly strike me as phrases that belong in the same sentence when it comes to IT.

    • I'm a picky security professional. While certainly the design would require attention to security, I think it's perfectly doable. There are two main points I'd watch out for.

      The one and only internet-accessible device would be a hardened VPN endpoint and minimal jumpbox. That's the part that has to be secure. Which means that system has to be maintained, getting security patches and VPN config updates as needed.

      Spanned with the inside interface of the VPN would be an IDS recording and analyzing all traffic

      • I like this, but what if the bad guys implant a BIOS-altering bug on the "no value" machine? Sure, they still won't get anything worthwhile, but you could never really trust that machine, right? If you even knew it was "bugged." Is there a mitigation strategy for that?
        • "you could never really trust that machine, right?"

          That's exactly the "mitigation". You don't trust it.
          Much like any machine running Windows. :)

          But seriously, you don't trust JavaScript on random web pages, right? You use the JavaScript to play the game or whatever on the web page; you don't trust it.

          If the bad guy owns the BIOS, the bad guy owns the machine. So it's the bad guy's machine. Just like any random web server you might use - it's presumably been compromised by a bad guy. Which means I use the S

    • 60 years ago, it was possible to run programs from anywhere in a university campus, as long as there was a dropbox for your punch cards and a pigeon hole for the results. Oh, and 24 hrs for the operators to actually run your program. I imagine at Intel, they'll be a team of guys/gals in white coats setting up experiments and running programs, then submitting results via a secure network. The actual hardware being operated would probably be stored in a climate-controlled warehouse and only powered up when ne
    • by AmiMoJo ( 196126 )

      They mean physically secure, so that the parts won't be stolen and won't be destroyed by a fire.

  • security testing is usually a lower priority than pushing profitable products and C level execs are loathe to fund anything that isn't a profit center, but I am absolutely floored that they didnt have a formal, company wide security testing standard until a few years ago. Remote testing obviously is a level up but given the volume:

    Marcel Cortes Beer, a manager at the lab, said it gets about 1,000 requests a month to build equipment for remote security tests, and 50 new devices come in weekly.

    I am amaz
  • Security research is near worthless, when decision makers who caused the speculative execution flaws not to be fired or roasted over hot coals. I have motherboards, that will never see microcode patches. Once I was told Intel was only chosen, because the documentation was good, relative to others. That went out the door, when SystemOnaChip chips came out (Intel makes money on 'glue' chips'. Now cost decisions mean price has moved to first place, with ARM having got away, even though some arm chips inherited
    • The entire point of this advertisement we're reading is to convince people that Intel is serious about these exploits. This announcement was probably planned in a boardroom that started with a conversation about their brand image.
      • Oooh, wow, insightful! You mean something a for-profit company has PR'd is intended to bolster the reputation of that company?! You've really got a handle on things, I'll give you that.
    • by reanjr ( 588767 )

      It's sad if their docs have gotten worse. I remember working with AMD64 back in the day, and Intel's docs were great. Well documented technology is so much nicer to work with.

      • Well, there have to be few hidden details to hide microcode and TPM patches. It would not do to break direct video output (Hollywood says no) or enable cpu serial numbers to change (that may hurt Google and FB). Then with Spectre etc, the performance hit - had to be covered up. You wont hear the phrase 'Product compromise' or 'Product pushing' but it is there. Like every other disaster, Intel had to disclose and release early, the stuff it had on paper to dent AMD and ARM. Thanks to TSMC, I dont think Intel
  • That's easy, Intel can just point to any of the processors they've made in ages and say "and there's another processor where we deliberately compromised security to get a leg up on AMD."

  • The lab brings commercial value to Intel, [said Mohsen Fazlian, general manager of Intel's product assurance and security unit.], citing company research that shows customers are more likely to buy technology from manufacturers that proactively test their products.

    Given we are talking about large micro processors, network and storage controllers, and chipset products here which generally can't be just be swapped for contemporary replacements this seems rather self serving to me. If you find a vulnerability in these things your options are basically; replace it and probably most of the machine around it at the same time; disable the affected features which is often so crippling you'll want to replace it anyway; or ignore the issue and hope for the best. This isn't lik

  • A company thinks 10 years ahead?
    Call me shocked!

  • It's in Costa Rica, I'm sure a few satellite images will sort it out. You also know damn well that their competitors know where it is and most likely China and US authorities too.

Real Programmers think better when playing Adventure or Rogue.

Working...