You are currently viewing NEW – 20 GB of confidential Intel documents and specifications leaked online

NEW – 20 GB of confidential Intel documents and specifications leaked online

NEW – 20 GB of confidential Intel documents and specifications leaked online 

The leaked database contains Intel files that are subject to a non-disclosure agreement.

Swiss IT consultant Tillie Kottmann has released 20 GB of confidential technical material, source code as well as Intel documents and specifications leaked related to various processors and chipsets.

“They were given to me by an anonymous source who hacked into the company’s network earlier this year. And also, more information on this will be published shortly, “Kottmann said on Twitter.

According to an Intel spokesman, the information most likely came from the Resource and Design Center, which is a private data library for computer manufacturers. Also, access to the center is closed to ordinary users, as confidential content is intended for creating firmware and designing motherboards compatible with Chipzilla microprocessors.

The leaked database contains approximately 20 GB of confidential Intel files covered by a non-disclosure agreement, including:
  • Such as Intel ME Bringup tutorials, tools and samples for various platforms;
  • Kaby Lake BIOS (Purley Platform) reference and sample code, and initialization code;
  • Intel CEFDK (Consumer Electronics Firmware Development Kit)
  • Silicon / FSP source packages for various platforms;
  • Also, Various Intel development and debugging tools;
  • Simulation Simulation for Rocket Lake S and possibly other platforms;
  • Technological road maps;
  • Binaries for camera drivers developed by Intel for SpaceX;
  • As well as, Schematics, documents, tools, and firmware for the unreleased Tiger Lake platform;
  • Kaby Lake FDK Tutorial Videos;
  • Intel Trace Hub and decoder files for various Intel ME versions;
  • Elkhart Lake Silicon Reference and Platform Sample Code;
  • Also, Verilog data for various Xeon platforms;
  • Debugging BIOS / TXE assemblies for various platforms;
  • SDK Boot Guard (encrypted archive);
  • Intel Snow Ridge / Snowfish Process Simulator ADK;
  • Various schemes;
  • And finally, Intel Marketing Templates (InDesign).

Henceforth, WE WISH TO ANNOUNCE THAT OUR SERVICES ARE NOT AVAILABLE TO PEOPLE FROM NIGERIA AND INDIA. THESE ARE USELESS TIME WASTERS AND THIEVES TRYING TO BEG OR SCAM US OF OUR PRODUCTS. OUR SERVICES ARE NOT FREE AND PAYMENT IS UPFRONT

A LOT OF FOOLS FROM NIGERIA AND INDIA. on the off chance that YOU DON’T TRUST TO USE OUR SERVICES, DON’T CONTACT US AS WE HAVE NO FREE SERVICE

CONTACT US FOR PURCHASES/INQUIRIES, WE RESPOND ALMOST INSTANTLY 

HI BUYERS, WE ARE A PROFESSIONAL CARDING AND HACKING TEAM. HOVATOOLS HAS BEEN AROUND SINCE THE TIME OF EVO MARKET, ALPHABAY, WALLSTREET MARKET AND MORE. WE REMAIN STRONG AND RELIABLE IN THE INDUSTRY, ALWAYS PROVIDING YOU WITH THE BEST QUALITY TOOLS TO HELP YOU MAKE MONEY AND MAXIMIZE PROFIT IN THE FRAUD GAME.

TO GET STARTED, YOU CAN VISIT OUR ONLINE SHOP/STORE TO BUY EVERYTHING YOU NEED TO START CASHING OUT.  AT THE SHOP YOU GET Accounts & Bank Drops CVV & CARDS DUMPS PERSONAL INFORMATION & SCAN.

BANK HACKING SOFTWARE – WIRE/ACH DARKWEB MONEY TRANSFER HACKERS

Buy Fresh Credit Cards for Carding, BIN LIST Buy Bank Login, RDP, Buy Hacked Paypal accounts. Contact us to buy all tools and carding software. CLICK HERE TO VISIT OUR SHOP
Buy Socks 5, Email Leads, Buy Latest CC to Bitcoin Cashout Guide, Buy Hacked Zelle transfer , Western Union Money Transfer Hack, Buy Hacked Money Transfer service to your bank account.
Enroll for Paid private Carding Class.

 

Admin

The enigmatic hacking blogger who unravels the digital mysteries through his captivating blog. With relentless curiosity and a nimble touch on the keyboard, I explore the intricate web of cyberspace, exposing vulnerabilities and advocating for responsible digital citizenship. My poetic and insightful articles paint vivid pictures of the ethical dilemmas surrounding privacy, encryption, and the convergence of technology and humanity. Join me on an exhilarating journey through the labyrinth of hacking and cybersecurity as he empowers readers to become guardians of their online identities.

Leave a Reply