Hacker News new | past | comments | ask | show | jobs | submit login

http://people.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100402-...

PDF Page 66

This attack could be used indefinite times to compromise the Intel’s AMT remote provisioning process and subverts the security of the non configured PCs that include the AMT functionality even while it is disabled within the BIOS configuration as presented in section 3.7.6.

AMT is always active, even if you've set it to "Disabled" and can be remotely activated. Again, without your authorization.




The paper is nice, however it covers an ancient AMT version. AFAIK this won't work on recent versions (it has saner defaults).




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: