• Snot Flickerman@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      edit-2
      9 months ago

      https://puri.sm/posts/reverse-engineering-the-intel-management-engine-romp-module/

      Because parts of it have already been reverse engineered, we know it runs a modified version of Minix, and I would think that if a backdoor had been found during the reverse engineering process, that it would have been huge fucking computer security news.

      It’s only a backdoor in the sense that Intel was practicing security through obscurity instead of real security. There is proof an attacker could abuse the IME, but there is not proof it’s an intended backdoor for use by Intel in spying on their customers.

      EDIT: Further, as an all-AMD user, I almost never see this same scrutiny applied to the AMD Platform Security Processor. We know far less about it, and it deserves the same level of scrutiny, honestly.

      • Treczoks@kbin.social
        link
        fedilink
        arrow-up
        5
        arrow-down
        1
        ·
        9 months ago

        that it would have been huge fucking computer security news.

        Nope. If someone found such a backdoor, it is more likely he/she sold it to the three letter agencies, who love hoarding vulnerabilities like that.

      • ReakDuck@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        9 months ago

        Damn, thanks.

        I was afraid for a second if my decision was bad for the server to use Intel with ME instead of a very specific hardware with coreboot.

        I think this would cost me 1000€ instead of 120€ just for being paranoid.