Legacy Intel CPUs hardware vulnerability

Share interesting information or links related to portable apps here.
Post Reply
Message
Author
User avatar
Midas
Posts: 4107
Joined: Mon Dec 07, 2009 7:09 am
Location: Sol3

Legacy Intel CPUs hardware vulnerability

#1 Post by Midas » Tue Aug 11, 2015 3:14 pm

If only by it's sweeping nature, this is HUGE! :shock:

I haven't delved on all the details and implications of the vulnerability, but I can't shake the suspicion of programmed obsolescence:

User avatar
Midas
Posts: 4107
Joined: Mon Dec 07, 2009 7:09 am
Location: Sol3

Re: Legacy Intel CPUs hardware vulnerability

#2 Post by Midas » Sat Nov 07, 2015 8:27 am

Not that Intel technologies like IME or AMT are lesser concerns for everyone's privacy/security...

= IME =
  • [url=http://libreboot.org/faq/#intelme]http://libreboot.org/faq/[/url] author wrote:The Intel Management Engine with its proprietary firmware has complete access to and control over the PC: it can power on or shut down the PC, read all open files, examine all running applications, track all keys pressed and mouse movements, and even capture or display images on the screen. And it has a network interface that is demonstrably insecure, which can allow an attacker on the network to inject rootkits that completely compromise the PC and can report to the attacker all activities performed on the PC. It is a threat to freedom, security, and privacy that can't be ignored.
= AMT =
  • [url]http://en.wikipedia.org/wiki/Intel_Active_Management_Technology[/url] author wrote:AMT relies on a hardware-based out-of-band (OOB) communication channel that operates below the OS level, the channel is independent of the state of the OS (present, missing, corrupted, down). The communication channel is also independent of the PC's power state, the presence of a management agent, and the state of many hardware components (such as hard disk drives and memory).

Post Reply