• Snot Flickerman@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    edit-2
    9 months ago

    https://puri.sm/posts/reverse-engineering-the-intel-management-engine-romp-module/

    Because parts of it have already been reverse engineered, we know it runs a modified version of Minix, and I would think that if a backdoor had been found during the reverse engineering process, that it would have been huge fucking computer security news.

    It’s only a backdoor in the sense that Intel was practicing security through obscurity instead of real security. There is proof an attacker could abuse the IME, but there is not proof it’s an intended backdoor for use by Intel in spying on their customers.

    EDIT: Further, as an all-AMD user, I almost never see this same scrutiny applied to the AMD Platform Security Processor. We know far less about it, and it deserves the same level of scrutiny, honestly.

    • Treczoks@kbin.social
      link
      fedilink
      arrow-up
      5
      arrow-down
      1
      ·
      9 months ago

      that it would have been huge fucking computer security news.

      Nope. If someone found such a backdoor, it is more likely he/she sold it to the three letter agencies, who love hoarding vulnerabilities like that.

    • ReakDuck@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      9 months ago

      Damn, thanks.

      I was afraid for a second if my decision was bad for the server to use Intel with ME instead of a very specific hardware with coreboot.

      I think this would cost me 1000€ instead of 120€ just for being paranoid.