Am Montag, 13. November 2017 schrieb dan pridgeon:
>
> From: info at smallinnovations dot nl <info@???>
> To: dng@???
> Sent: Sunday, November 12, 2017 5:42 AM
> Subject: Re: [DNG] (forw) Re: [skeptic] MINIX: ?Intel's hidden in-chip operating system
>
> On 09-11-17 02:24, Rick Moen wrote:
> > Vaughan-Nichols's article is at
> > http://www.zdnet.com/article/minix-intels-hidden-in-chip-operating-system/
> >
> >
> > ----- Forwarded message from Rick Moen <rick@???> -----
> >
> > Date: Wed, 8 Nov 2017 17:19:35 -0800
> > From: Rick Moen <rick@???>
> > To: skeptic@???
> > Subject: Re: [skeptic] MINIX: ?Intel's hidden in-chip operating system
> > Organization: If you lived here, you'd be $HOME already.
> >
> > Quoting Scott Peterson (scottp4@???), citing a mostly good
> > Steven J. Vaughan-Nichols's ZDnet article:
> >
> >> Buried deep inside your computer's Intel chip is the MINIX operating
> >> system and a software stack, which includes networking and a web
> >> server. It's slow, hard to get at, and insecure as insecure can be.
> [...]
> >
> > Garrett's AMT FAQ makes good reading for people wanting to know more.
> > https://mjg59.dreamwidth.org/48429.html?thread=1840429
> >
> > This includes the fact that by _no_ means do all Intel chipsets
> > possessing ME firmware also have AMT code that runs on it -- and how to
> > query your machine to find out if it does. Most Intel systems don't
> > have AMT. Most Intel systems with AMT don't have it turned on.
> >
> > It also includes the fact that the biggest concern is remote access to
> > the AMT. If that isn't enabled, and there are various ways to ensure
> > that it isn't, that concern (a remote backdoor) goes away.
> >
> >
> > _______________________________________________
> > skeptic mailing list
> > skeptic@???
> > http://linuxmafia.com/mailman/listinfo/skeptic
> > To reach the listadmin, mail rick@???
> >
> > ----- End forwarded message -----
> > _______________________________________________
> > Dng mailing list
> > Dng@???
> > https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng
>
> When reading
> https://www.theregister.co.uk/2017/11/09/chipzilla_come_closer_closer_listen_dump_ime/
> where some claim to be able to access ME via USB ports I wonder how long
> it takes before ME is enabled and abused by malware.
You should include "lawful inspection" under the label "malware". And then, well, guess what ...
Nik
>
> Grtz
>
> Nick
>
> _______________________________________________
> Dng mailing list
> Dng@???
> https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng
>
>
> Does this imply that after the JTAG is fully exploited, the contents of ME could be extracted,dis-assembled, updated, and reloaded to allow the machine to boot and run? And could the ME be updatedfrom the selfsame machine by cross-connecting two USB ports? Just thinking out loud.
>
>
--
Please do not email me anything that you are not comfortable also sharing with the NSA, CIA ...