You must be an Intel fanboy, because you are fucking useless. Try reading sources before commenting, because you sound as truly and completely half-wit person.
- It has been already proven by a security researcher that the feature is NOT completely disabled after switching it off in BIOS
- There is currently no way to completely disable the feature in a way which can be verified
- There is currently NO way to reverse engineer what exactly is the AMT even doing, because it's all encrypted to the fucking root
Please fix yourself and be smarter, because i really fucking hate talking to stupid people.
Who is this so called 'security researcher' and why should I trust him? Whos to say that he's not an AMD fanboy?
Please provide links from multiple sources.
I'm not a fanboy of any CPU at this point in my life. It's all the same to me anymore, just another layer of abstraction.
The articles state it's all theoretical and we don't know what's happening. Assuming the worst and telling everyone to start building their own chips is absolutely insane. Hell, you trust random third parties as your CAs for PKI. You trust others for transmitting data over the internet.
If someone wanted data, I think compromising a root CA / watching network traffic would be a fuckton easier than somehow installing a rootkit on a CPU that transmits data pass your firewalls magically. How would anyone even be able to trigger an attack in the first place? Scheduled in the rootkit to turn on a certain date. Fuck, do you know how many times I've had to replace a CMOS battery in my lifetime. Shit isn't magic. It's tech.
Pretty much, this is tin-foil hat-ness of people spreading FUD. We should watch it, but we shouldn't jump up and down saying it's unsafe and to migrate away from it. Technically, even the article points it out itself:
Traditional CPU backdooring
Of course they could, no question about it. But one can say that Intel (as well as AMD) might have been having backdoors in their processors for a long time, not necessarily in anything related to SGX, TPM, TXT, AMT, etc. Intel could have built backdoors into simple MOV or ADD instructions, in such a way that they would automatically disable ring/page protections whenever executed with some magic arguments. I wrote more about this many years ago.
The problem with those “traditional” backdoors is that Intel (or a certain agency) could be caught using it, and this might have catastrophic consequences for Intel. Just imagine somebody discovered (during a forensic analysis of an incident) that doing:
MOV eax, $deadbeef
MOV ebx, $babecafe
ADD eax, ebx
...causes ring elevation for the next 1000 cycles. All the processors affected would suddenly became equivalents of the old 8086 and would have to be replaced. Quite a marketing nightmare I think, no?
Edit: If you want me to, I can go completely tin-foil mode and tell you of every theoretical vulnerability there is and how pretty much almost any entity (everyone from a terrorist organization to a government entity to even freaking me) could be watching your every move.
Edit2: Wow, I just read part of that reddit thread. /u/ShadowOfHarbringer got absolutely fucking destroyed by those that actually know security.