Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Unless you modified your BIOS with a SPI flasher after disassembling your device, you know it's still running :-)

It would disappear from the PCI bus.

Your commands un-provision AMT (Active Management Technology), the ME feature that apparently has a security issue. Unless you've explicitly enabled AMT, it's not provisioned anyway so this doesn't do anything.



> Your commands un-provision AMT (Active Management Technology), the ME feature that apparently has a security issue.

It disables the optional OS-side of AMT. How do we know that the vulnerability is in the OS-side? Has this been established yet?


May be worth reading the coreboot wiki, I remember reading about the different subsystems of AMT, and it seems plausible that you can set it into a state where control functions are disabled. But my memories are very blurry.

Still coreboot guys are quite experts on the matter.


Unprovisioning disables both the OS side and the hardware AMT. It doesn't change anything if you never enabled AMT.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: