|08 Dec 2011||#1|
| || |
Intel AMT - Hardware Backdoor?
I was helping my friend setup his new Acer laptop.
We ran PC Decrapifier (thanks to everyone who has suggested using this utility ).
Afterwards we noticed some Intel services running on the laptop.
A brief Internet search revealed some terrifying information.
"Embedded in hardware, Intel® vPro™ technology capabilities are accessed and administered separate from the hard drive, OS, and software applications – in a pre-boot environment. This makes management less susceptible to issues affecting these areas and allows remote access to the PC regardless of the system’s power state or OS condition. Key encryption components are kept in protected FLASH memory, separate from the data they protect, making it easier to secure and harder to penetrate and access sensitive information."
Features (edited "highlights"):
Forget about Rootkits and (alleged) MS Windows Backdoors, Intel AMT does it all.
|My System Specs|
|Similar help and support threads for2: Intel AMT - Hardware Backdoor?|
|NSA backdoor in window 7||General Discussion|
|Backdoor:Win32/Cycbot.B problem||System Security|
|Apple QuickTime backdoor||News|
|Intel 5100agn WiFi Card – hardware failure, driver ok||Network & Sharing|
|What is a backdoor? help||System Security|