Exposing JTAG over a USB port sounds like an exploit waiting to happen. Commercial products usually don’t even use standard pinouts so you have to build a special cable / jig before you even get physical access to the device, then open it up to get to the programming header / pads.
Edit: After reading up on it, any system pre-2015 (Skylake) doesn’t support JTAG over USB, and it’s disabled by default so most consumer goods are probably relatively safe.
Wouldn’t surprise me a bit if that were the case. For years I have been ride or die for Intel hardware based on reliability. This is a disaster. I already have an older but serviceable PC, but with a six year old i5 I’m going to be on the higher end of that performance loss and I can’t afford a new AMD motherboard and processor right now.
It comes down to WHEN did he sell it, before the release of the info or after? Even if he found out about the vulnerability got set to sell and then sold like 60 seconds after the announcement, then he’d skirt the law,
Source: interned in a compliance office
When he published the plan to sell I think. How far in advance has this been planned? Months? A year? More? Pretty sure execs don’t decide to buy or sell their own stock on a whim, precisely because of the insider trading implications.
I mean maybe it is shady. I’m sure the SEC will check it out.