Recent content by freebirds

  1. F

    Hidden TPM & hidden bluetooth in XP, Visa & 7 latops

    Getochkn, there are lots of articles that TPM has a backdoor. Backdoors are not "simply a chip with a unique private key..." Getochkn, to answer your question, I am asking you and other readers to conduct a simple scan. Download a free copy of PartedMagic at...
  2. F

    Hidden TPM & hidden bluetooth in XP, Visa & 7 latops

    The pengpod tablet is a linux open source hardware project. I trust open source hardware except for the processor. Though users of linux use linux because it is open source software, they prefer closed ARM processors with TrustZone, viritualization extensions and Mobicore over the only processor...
  3. F

    Hidden TPM & hidden bluetooth in XP, Visa & 7 latops

    TPM uses hidden embedded bluetooth to geolocate and completely remotely control computers regardless whether they are offline or online. Laptops released at least as far back as 2009 who's specifications say no bluetooth actually have a hidden embedded bluetooth inaccessible to users. Laptops...
  4. F

    Germany warns TPM is backdoor. Which netbooks have TPM?

    The author of the article is wrong. Almost all "linux machines" were formerly Windows machines. Microsoft requires TPM and starting with Windows 8.1, Microsoft will require bluetooth. TPM and bluetooth modules are in the linux kernels. Linux does not automatically enable and activate TPM and...
  5. F

    Germany warns TPM is backdoor. Which netbooks have TPM?

    Your warning to stay away from Windows 8 does not suffice. Microsoft's hardware requirement for TPM started with Vista. I don't use Windows. I use Linux. Linux kernels contain TPM's modules. If the computer has TPM, Linux will automatically load the TPM modules when booting up. My HP Mini...
  6. F

    Germany warns TPM is backdoor. Which netbooks have TPM?

    Germany warns TPM is a backdoor. As the articles below explain, TPM grants complete remote control of the computer. The recommended switch to Linux does not suffice. My abuser's crackers tampered with my Linux OS to use TPM. TPM uses hidden embedded bluetooth to geolocate a computer offline by...