Re: [beagleboard] Unique identifier in DMSoC and SoC?

156 views
Skip to first unread message

Maxim Podbereznyy

unread,
Jun 25, 2012, 12:07:09 PM6/25/12
to beagl...@googlegroups.com

There is not uuid available to TI. What are you talking about?

25.06.2012 4:24 пользователь "free...@hushmail.com" <free...@hushmail.com> написал:
"I need to purchase a single board that does not have a processor with an unique identifier number (UUID). I am considering purchasing a BeagleBoard xM which uses the DM3730CBP. However DM represents digital media so it is a DMSoC. Digital media management means the entertainment industry condition on giving video codecs is a requirement of an UUID in the processor.  Thereby, websites and websites that have been hacked can procure the UUID. They can sell the UUID to information brokers who resell it to investigators who resell it to abusers. I am a domestic violence victim. My abuser has hired investigators and hackers.

Can the UUID in DM3730CBP be hidden from being visible online?

Do you know whether Texas Instruments programs the UUID into otp memory? Does Beagleboard then program it it otp memory? If not programmed into otp memory, is it not visible online?

Is the DMSoC soldered to the motherboard or is it easily replaceable? Can I replace the DM3730CBP in the BeagleBoard xM with a Texas Instrument processor that does not have an UUID? Do you know any that do not?

The original 2009 BeagleBoard uses Texas Instrument's OMAP3350DCBB72 processor. Does this processor have an UUID? Is it visible online?"

Does either BeagleBoard have a dip switch? A dip switch could erase firmware rootkits from the processor and motherboard. If there is no dip switch, is it possible to add it? Yes, my abuser's hacker infected my BIOS and motherboard with firmware rootkits. Reflashing the BIOS did not erase the firmware rootkits. Nor could I remove the firmware rootkits in the graphic card.

Thank you.

-- To join: http://beagleboard.org/discuss
To unsubscribe from this group, send email to:
beagleboard...@googlegroups.com
Frequently asked questions: http://beagleboard.org/faq

free...@hushmail.com

unread,
Jun 25, 2012, 3:28:50 PM6/25/12
to beagl...@googlegroups.com
I asked on the Texas Instruments forum at http://e2e.ti.com/support but did not receive a reply. Hence, I am asking this forum.

The Olimex uses a  Freescale iMX233 ARM926J processor.  The Hercules Linux netbook and the Genesi EFIKA MX Linux netbook use a ARM CortexTM A8 FreescaleTM i.MX515.  Olimex forum replied that their Freescale processor has an UUID. Genesi support replied that most likely their Freescale processor has an UUID because of Digital Rights Management. The entertainment industry requires an UUID as a condition to grant video codecs.

sup...@freescale.com replied that their processors that do not have an UUID are "devices of i.MXS or i.MXL series." Unfortunately, this rules out Olimex, Hercule sand Genesi Efika. There are no single boards nor netbooks with an i.MXS or i.MXL processor.

Since the 1990's, Intel and AMD inserted an UUID in their processor. Initially, computer manufacturers offered an option in the BIOS to hide the UUID. Then they stopped offering this option. Starting with last year's models, computers display the UUID in their BIOS. The UUID is visible to IT administrators, hackers, websites and websites that have been hacked.  They can sell the UUID and other tracking information to information brokers who resell it to investigators who resell it to abusers.  I am a domestic violence victim . My abuser hired investigators and hackers. His hackers are geolocating my netbooks by tracking the UUID of my processor. I have removed the internal wifi/bluetooth card. I use brand new network adapters to get a new MAC address since I could not configure MacChanger to start at start up in Fedora. I connect to the internet using live DVDs. It no longer my abuser's hacker's malware that is cyberstalking me. They are geolocating me via my UUID and firmware rootkits in my BIOS and graphic card.I could not erase the firmware rootkits by relfashing the BIOS. I don't know how to flash a graphic card. I purchased a new netbook. Used a live DVD. They procured the UUID of my processor and geolocate my brand new netbook.

Does anyone know for sure whether the processor in either BB has an UUID?




Robert Nelson

unread,
Jun 25, 2012, 3:38:38 PM6/25/12
to beagl...@googlegroups.com
It has a die ID..

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=blob;f=arch/arm/mach-omap2/id.c;hb=HEAD

Most of the ID is used for core revision info between omap/am/dm familes..

Regards,

--
Robert Nelson
http://www.rcn-ee.com/

free...@hushmail.com

unread,
Jun 25, 2012, 5:34:07 PM6/25/12
to beagl...@googlegroups.com
Thank you for giving the correct search term "die ID." I was using the search terms "processor serial number" (PSN) and UUID and was not getting answers. Could you please answer the rest of my question? Are UUID also known as Die IDs visible? If so, how to hide the ID? Does BB have die ID programmed into otp memory?

Olimex's reply:"Reference manual states in security features section of product features: "Read-only unique ID for digital rights management algorithms" So yes, there is some unique ID. Most likely unique ID can be seen withing kernel only, because peripheral address ranges are not accessible within user programs. If you trust your kernel you should be fine. If it has, just dont expose it to user progams. Unique id can be programmed in otp memory. As from factory, unique id comes unprogrammed and hence olinuxinos do not have it programmed."

Do BBs have die ID or UUID programmed into opt memory and user programs?

A developer of an app requested an easy way of  reading the die ID as displayed by u-boot on each Overo Board. The Overo Board has an OMAP35xx processor. Three ways were provided at http://gumstix.8.n6.nabble.com/How-to-obtain-Die-ID-other-Unique-ID-from-user-code-td561592.html

Discussion on exporting two IDs (IDCode and Production ID) to userspace is at: http://www.mail-archive.com/linux...@vger.kernel.org/msg27144.html

"This patch exports the OMAP3 IDCODE and Production ID to userspace via /proc/cpuinfo using the system_soc_info.Die ID is also exported depending on what users pass as kernel  parameter. It is same protection mechanism made for x86 product number. So, if user passes "omap3_die_id" parameter, it will append die id code into /proc/cpuinfo as well. A Kconfig option has been added as well, so it can be configurable during compilation time."

Is the die ID the same as unique ID for digital rights management, IDCode and Production ID? Or are there more than one IDs?

Is there any way to prevent a hacker or an app or a website from making the ID visible? If a hacker were to utilize one of the above ways to make the die ID and/or IDCode or Production ID always visible to enable geolocating the computer, how to reverse this? Does replacing the microSD card with the OS with a "system rescue" (copy of OS) microSD card hide the ID? Or does the processor need to be replaced?

Maxim Podbereznyy

unread,
Jun 26, 2012, 7:55:43 AM6/26/12
to beagl...@googlegroups.com
It's up to you read Die ID or not. No obligations

2012/6/26 free...@hushmail.com <free...@hushmail.com>:

Andrew Bradford

unread,
Jun 26, 2012, 8:56:34 AM6/26/12
to beagl...@googlegroups.com, free...@hushmail.com
If you're this paranoid about computer and Internet use, simply not
using the Internet should be a highly considered option.

-Andrew

Maxim Podbereznyy

unread,
Jun 26, 2012, 9:21:48 AM6/26/12
to beagl...@googlegroups.com
he watched films about spies too much. Like big brother is always
watching us. And even simple Die id is under control

2012/6/26, Andrew Bradford <and...@bradfordembedded.com>:
> If you're this paranoid about computer and Internet use, simply not
> using the Internet should be a highly considered option.
>
> -Andrew
>

free...@hushmail.com

unread,
Jun 26, 2012, 10:06:04 AM6/26/12
to beagl...@googlegroups.com
It  is not up to me to read the die ID or not. Nor am I paranoid. I am asking whether both BBs have an UUID and if so, how to hide the die ID and keep it hidden to protect the processor from being hacked and infected with firmware rootkits.

In the 1990s, manufacturers installed an UUID or die ID in processors to enable e-commerce and years later, digital rights management, to universally identify computers on the internet  and track them.

Due to multiple OS on the market and Windows loosing its share, hackers are going away from hacking the OS to hacking the processor. Hacking the processor allows the hacker to gain full control on the kernel level. See:

http://www.theinquirer.net/inquirer/news/2185052/intel-cpu-flaw-vulnerable-hacker-attacks

http://www.infoworld.com/d/security-central/researcher-demonstrate-attack-code-intel-chips-036

http://www.networkworld.com/news/2010/020210-black-hat-processor-security.html

Firmware rootkits also allow the hacker to gain full control on the kernel level. See articles on the mebromi firmare rootkit such http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/ and apcmag.com/cpu_virus_can_attack_amd_intel_cpus.htm

Initially, my abuser's hackers infected my Windows OS. I switched to Linux. They infected Linux. I switched to Fedora and connecting to the internet with live DVDs. His hackers hacked my CUP and gained complete control of my netbooks. They infected my BIOS and graphic cards with firmware rootkits.

Hence, I am asking how to hide the die ID and keep it hidden? Alternately, does anyone know of a single board that does not have an UUID?

Robert Nelson

unread,
Jun 26, 2012, 10:28:49 AM6/26/12
to beagl...@googlegroups.com
Easy, patch the linux kernel yourself and disable reading the die ID
to userspace...

Vladimir Pantelic

unread,
Jun 26, 2012, 10:29:41 AM6/26/12
to beagl...@googlegroups.com
free...@hushmail.com wrote:
> It is not up to me to read the die ID or not. Nor am I paranoid. I am asking whether both BBs have an UUID and if so,
> how to hide the die ID and keep it hidden to protect the processor from being hacked and infected with firmware rootkits.

yes, they have a unique ID. it is up to the SW running on the board
to read and expose it. if you do not trust the SW running on
it, then nobody cannot assure you that it wont be read.

whether somebody is going to target you with a beagleboard
specific rootkit that will expose your unique ID, I cannot
say...


free...@hushmail.com

unread,
Jun 26, 2012, 2:17:24 PM6/26/12
to beagl...@googlegroups.com
Robert Nelson replied: "Easy, patch the linux kernel yourself and disable reading the die ID to userspace" 

This would not be easy for me to do. I am not a programmer. Is there a tutorial on this?

Vladimir wrote: "yes, they have a unique ID. it is up to the SW running on the board to read and expose it. if you do not trust the SW running on it, then nobody cannot assure you that it wont be read."

Vladimir, what do you mean by SW? Do you mean OS? How to program the SW not to read and export die id?

Vladimir Pantelic

unread,
Jun 26, 2012, 4:38:14 PM6/26/12
to beagl...@googlegroups.com
normally, the Linux kernel reads the die-id and makes it available
to user space via some /proc/ entry. that is something that can be
disabled. Still with such a kernel, there is no guarantee that there
won't ever by some exploit/hack or whatever to still access it somehow.
You would need to trust the SW you are running.


What I do not understand in your fear of the UUID is, if you
are infected with a virus/trojan that can read the UUID and
transmit it elsewhere, this virus/trojan could do much worse
things like monitor your keyboard/screen etc.. So having your
UUID sent somewhere should be the least of your worries.



Reply all
Reply to author
Forward
0 new messages