Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Conversation

Notices

  1. auroradelagente (auroradelagente@quitter.es)'s status on Tuesday, 26-Sep-2017 15:41:55 EDT auroradelagente auroradelagente
    #Intel #vPro #IME #AMT #backdoor #spying #boycott Active Management Technology (Intel AMT), vPro, Intel Management Engine (IME). Acceso remoto, incluso con el computador apagado. No es nuevo, pero aún así aterrador y urgente. No compre computadores con procesador #Intel de séptima generación o posterior.

    https://puri.sm/learn/avoiding-intel-amt/

    https://popularresistance.org/new-intel-based-pcs-permanently-hackable/

    https://www.infowars.com/91497/

    http://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/

    https://fossbytes.com/intel-processor-backdoor-management-engine/

    http://techrights.org/2014/06/20/active-management-technology/

    https://danielpocock.com/spyware-dolls-and-intel-vpro

    https://www.uberwall.org/bin/download/download/102/lacon12_intel_amt.pdf

    https://forums.lenovo.com/t5/Security-Malware/Intel-AMT-backdoor-enabled-by-default/td-p/824749

    https://www.blackhat.com/docs/us-17/thursday/us-17-Evdokimov-Intel-AMT-Stealth-Breakthrough-wp.pdf
    In conversation Tuesday, 26-Sep-2017 15:41:55 EDT from quitter.es permalink

    Attachments

    1. File without filename could not get a thumbnail source.
      How Purism avoids Intel's Active Management Technology
      from Purism
      How Purism avoids Intel’s Active Management Technology
    2. Invalid filename.
      New Intel Chips Contain Back-Door Processor, Hackable Even When Computer is Turned Off
      from PopularResistance.Org
      The new Intel Core vPro processors contain a new remote access feature which allows 100 percent remote access to a PC 100 percent of the time, even if the computer is turned off. Core vPro processo...
    3. File without filename could not get a thumbnail source.
      "Secret" 3G Intel Chip Gives Snoops Backdoor PC Access
      By Paul Joseph Watson from Infowars
      “Secret” 3G Intel Chip Gives Snoops Backdoor PC Access
    4. Unable to connect to tls://tr3.cbsistatic.com:443. Error: php_network_getaddresses: getaddrinfo failed: Name or service not known
      Is the Intel Management Engine a backdoor?
      from TechRepublic
      Is Intel's Management Engine a backdoor for security groups and hackers, or just a feature created to aid businesses? Jack Wallen dives in and draws his conclusions.
    5. Invalid filename.
      Intel x86 Processors Come With A Secret Backdoor That Nobody Can Fix
      By Adarsh Verma from Fossbytes
      A security researcher has outlined a dangerous loophole that affects the Intel CPUs that have Intel Management Engine and vPro enabled.
    6. Invalid filename.
      'Active Management Technology' is Quite Likely a Back Door, Along With Intel's UEFI
      from Techrights
      The dark hearts of computers, with a lot of secrets and circuitry whose behaviour cannot be verified, are also convenient back doors, even without additional bugs (implanted en route)
    7. File without filename could not get a thumbnail source.
      Intel AMT backdoor enabled by default
      Hi, Intel AMT is nothing else than a backdoor built into your system. Dell Latitude/HP Elitebooks both offer an option when you buy the pc to remove out of band management (AMT) but still get the functionality of vpro like vt-x/vt-d for virtualisation. You can even active it later (software level) ...
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.