and ODINSEYE.
And for the MUH AMD fanbois, When Intel was stomping AMD back in the day, they purchased a good portion of stock in AMD to help prop them back up. Which means Intel sits(or at least sat) on AMD's board...
Old info, but may still be of use on legacy chips:
intel management engine IS the backdoor, it doesn't need anything added. everything mentioned in that 4chan post is advertised wholly as features. idea is, a company can log in and remotely administer any computer it deployed, regardless of changes that might've been made on the software side (new OS, company software mucked around with, etc.) the big problem is that there's no way to tell whom other than the customer has full access to this wonderful remote management "service", via master access keys that intel, (or whatever government with an interest in what people do on their computers) might have hidden away in their back pocket. never mind governments or corporations being able to see what nasty porn you like, what happens if some nerd figures out how to crack ME and reveals this theoretical master key (or some other workaround) for anyone to use? that's a lot of computers in the world immediately compromised in the deepest way possible. amd has the same kind of low level management "service", marketed as TrustZone. same issue as ME some work has been done towards removing ME code from affected chipsets. check out: https://hardenedlinux.github.io/firmware/2016/11/17/neutralize_ME_firmware_on_sandybridge_and_ivybridge.html. basically the idea is to overwrite as much of the found ME code as possible, while still letting the chip run. hopefully, enough guts gets ripped out that ME ceases to function if remote access is attempted
Great comment. ty.
(post is archived)