Rezultati pretraživanja
  1. 27. stu 2017.

    Gosh, i may have stumbled on some top secret Intel IP.

  2. 31. pro 2019.

    Here is the recording of my talk on the : As I said, timing was bad, and this is mostly focusing on platform basics to get into the field. I will do better at in the Open Source devroom, I promise!

    Prikaži ovu nit
  3. 9. pro 2017.
  4. 18. lip 2016.
  5. E.g. it is absolutely unacceptable there exists an embedded system () within our processors which has (hardware) DMA capability to access host memory. It is merely irrelevant if/how the _current_ ME firmware makes use of it.

    Prikaži ovu nit
  6. 27. pro 2017.

    Our presentation "Inside Intel Management Engine" about activation JTAG for IntelME

  7. 28. kol 2017.

    How to disable Intel ME 11 via undocumented mode

  8. This thread shows how tricky it is to reason about real (problematic) impact of :/ Apparently it is confusing even to the most seasoned researchers... Dear , REMOVE "ME" HARDWARE FROM _OUR_ COMPUTERS!

    Prikaži ovu nit
  9. 20. stu 2017.
  10. 6. sij 2018.

    Looming Digital : Design shortcuts & other techniques for optimization sacrificed security for speed or memory space ?

  11. 8. ruj 2017.

    amt isn't responding and intelmetool produces weird output. I think my is sucessfully disabled.

  12. 10. lip 2019.
  13. A code exec bug in AMD PSP module implementing TPM. PSP is similar to . Key Qs: 1. Does PSP/fTPM have access to host memory? 2. How well is fTPM module isolated from the rest of the PSP? 3. How asynchronous is PSP execution with regards to the host?

  14. 27. pro 2017.

    Next Stop: Inside Intel Management Engine.

    Prikaži ovu nit
  15. Totally agree. And that's not the only thing that's unacceptable about : blatant open source licence infringement is another dimension of wrong, for example. But there's plenty more reasons to be worried about security, too.

  16. 25. pro 2017.

    What about a GUI when debuging Intel ME? If you are intrigued visit our talk at ()

  17. 29. pro 2017.
    Odgovor korisniku/ci

    Physical Security will be my focus. Protecting servers against JTAG attacks to using a good old fashioned lock and key.

  18. 20. svi 2019.
    Odgovor korisniku/ci

    Proven fact is that modified hardware for the CIA, has and had built in backdoors, CPUs are full of flaws and backdoors () and corporations are forced to cooperate with the CIA, NSA, FBI etc. Short: Avoid US American espionage hardware at all cost!

  19. 24. pro 2017.

    If you want to know how activate JTAG for Intel ME then visit Saal Borg on Dec 27th at 16:30.

  20. 12. ruj 2018.

    Positive Technologies researcher finds vulnerability enabling disclosure of Intel ME encryption keys

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.