<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Intel x86s hide another CPU that can take over your machine (you can&#8217;t audit it) / Boing Boing</title>
	<atom:link href="http://www.epanorama.net/blog/2016/06/15/intel-x86s-hide-another-cpu-that-can-take-over-your-machine-you-cant-audit-it-boing-boing/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/06/15/intel-x86s-hide-another-cpu-that-can-take-over-your-machine-you-cant-audit-it-boing-boing/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 18 Apr 2026 07:57:21 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/06/15/intel-x86s-hide-another-cpu-that-can-take-over-your-machine-you-cant-audit-it-boing-boing/comment-page-1/#comment-1526487</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 29 Nov 2016 12:28:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=42934#comment-1526487</guid>
		<description><![CDATA[The Trouble With Intel’s Management Engine
http://hackaday.com/2016/01/22/the-trouble-with-intels-management-engine/]]></description>
		<content:encoded><![CDATA[<p>The Trouble With Intel’s Management Engine<br />
<a href="http://hackaday.com/2016/01/22/the-trouble-with-intels-management-engine/" rel="nofollow">http://hackaday.com/2016/01/22/the-trouble-with-intels-management-engine/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/06/15/intel-x86s-hide-another-cpu-that-can-take-over-your-machine-you-cant-audit-it-boing-boing/comment-page-1/#comment-1526486</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 29 Nov 2016 12:27:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=42934#comment-1526486</guid>
		<description><![CDATA[Neutralizing Intel’s Management Engine
http://hackaday.com/2016/11/28/neutralizing-intels-management-engine/

Five or so years ago, Intel rolled out something horrible. Intel’s Management Engine (ME) is a completely separate computing environment running on Intel chipsets that has access to everything. The ME has network access, access to the host operating system, memory, and cryptography engine. The ME can be used remotely even if the PC is powered off. If that sounds scary, it gets even worse: no one knows what the ME is doing, and we can’t even look at the code. When — not ‘if’ — the ME is finally cracked open, every computer running on a recent Intel chip will have a huge security and privacy issue. Intel’s Management Engine is the single most dangerous piece of computer hardware ever created.

Researchers are continuing work on deciphering the inner workings of the ME, and we sincerely hope this Pandora’s Box remains closed. Until then, there’s now a new way to disable Intel’s Management Engine.

Previously, the first iteration of the ME found in GM45 chipsets could be removed. This technique was due to the fact the ME was located on a chip separate from the northbridge. For Core i3/i5/i7 processors, the ME is integrated to the northbridge. Until now, efforts to disable an ME this closely coupled to the CPU have failed. 

With a BeagleBone, an SOIC-8 chip clip, and a few breakout wires, this script will run and effectively disable the ME. This exploit has only been confirmed to work on Sandy Bridge and Ivy Bridge processors.

Neutralize ME firmware on SandyBridge and IvyBridge platforms
http://hardenedlinux.org/firmware/2016/11/17/neutralize_ME_firmware_on_sandybridge_and_ivybridge.html]]></description>
		<content:encoded><![CDATA[<p>Neutralizing Intel’s Management Engine<br />
<a href="http://hackaday.com/2016/11/28/neutralizing-intels-management-engine/" rel="nofollow">http://hackaday.com/2016/11/28/neutralizing-intels-management-engine/</a></p>
<p>Five or so years ago, Intel rolled out something horrible. Intel’s Management Engine (ME) is a completely separate computing environment running on Intel chipsets that has access to everything. The ME has network access, access to the host operating system, memory, and cryptography engine. The ME can be used remotely even if the PC is powered off. If that sounds scary, it gets even worse: no one knows what the ME is doing, and we can’t even look at the code. When — not ‘if’ — the ME is finally cracked open, every computer running on a recent Intel chip will have a huge security and privacy issue. Intel’s Management Engine is the single most dangerous piece of computer hardware ever created.</p>
<p>Researchers are continuing work on deciphering the inner workings of the ME, and we sincerely hope this Pandora’s Box remains closed. Until then, there’s now a new way to disable Intel’s Management Engine.</p>
<p>Previously, the first iteration of the ME found in GM45 chipsets could be removed. This technique was due to the fact the ME was located on a chip separate from the northbridge. For Core i3/i5/i7 processors, the ME is integrated to the northbridge. Until now, efforts to disable an ME this closely coupled to the CPU have failed. </p>
<p>With a BeagleBone, an SOIC-8 chip clip, and a few breakout wires, this script will run and effectively disable the ME. This exploit has only been confirmed to work on Sandy Bridge and Ivy Bridge processors.</p>
<p>Neutralize ME firmware on SandyBridge and IvyBridge platforms<br />
<a href="http://hardenedlinux.org/firmware/2016/11/17/neutralize_ME_firmware_on_sandybridge_and_ivybridge.html" rel="nofollow">http://hardenedlinux.org/firmware/2016/11/17/neutralize_ME_firmware_on_sandybridge_and_ivybridge.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/06/15/intel-x86s-hide-another-cpu-that-can-take-over-your-machine-you-cant-audit-it-boing-boing/comment-page-1/#comment-1495525</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 17 Jun 2016 10:45:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=42934#comment-1495525</guid>
		<description><![CDATA[Other nasty things that could be hidden inside IC:

Researchers built devious, undetectable hardware-level backdoor in computer chips
http://www.computerworld.com/article/3079417/security/researchers-built-devious-undetectable-hardware-level-backdoor-in-computer-chips.html?token=%23tk.CTWNLE_nlt_computerworld_security_2016-06-08&amp;idg_eid=051598d6597df87056c54033166b3242&amp;utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=Computerworld%20Security%202016-06-08&amp;utm_term=computerworld_security#tk.cw_nlt_computerworld_security_issues_2016-06-08

A2: Analog Malicious Hardware
http://ieee-security.org/TC/SP2016/papers/0824a018.pdf]]></description>
		<content:encoded><![CDATA[<p>Other nasty things that could be hidden inside IC:</p>
<p>Researchers built devious, undetectable hardware-level backdoor in computer chips<br />
<a href="http://www.computerworld.com/article/3079417/security/researchers-built-devious-undetectable-hardware-level-backdoor-in-computer-chips.html?token=%23tk.CTWNLE_nlt_computerworld_security_2016-06-08&#038;idg_eid=051598d6597df87056c54033166b3242&#038;utm_source=Sailthru&#038;utm_medium=email&#038;utm_campaign=Computerworld%20Security%202016-06-08&#038;utm_term=computerworld_security#tk.cw_nlt_computerworld_security_issues_2016-06-08" rel="nofollow">http://www.computerworld.com/article/3079417/security/researchers-built-devious-undetectable-hardware-level-backdoor-in-computer-chips.html?token=%23tk.CTWNLE_nlt_computerworld_security_2016-06-08&#038;idg_eid=051598d6597df87056c54033166b3242&#038;utm_source=Sailthru&#038;utm_medium=email&#038;utm_campaign=Computerworld%20Security%202016-06-08&#038;utm_term=computerworld_security#tk.cw_nlt_computerworld_security_issues_2016-06-08</a></p>
<p>A2: Analog Malicious Hardware<br />
<a href="http://ieee-security.org/TC/SP2016/papers/0824a018.pdf" rel="nofollow">http://ieee-security.org/TC/SP2016/papers/0824a018.pdf</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
