These modifications underwent a limited validation cycle and are not an officially supported configuration. government’s “High Assurance Platform” program. In this case, the modifications were made at the request of equipment manufacturers in support of their customer’s evaluation of the U.S. In response to requests from customers with specialized requirements, we sometimes explore the modification or disabling of certain features. When told about the research, Intel told Positive Technologies: The researchers wrote, “We believe that this mechanism is designed to meet a typical requirement of government agencies, which want to reduce the possibility of side-channel leaks.” Apparently, the NSA wanted to ensure the agency could close off any possible security risk by disabling Intel ME. The researchers discovered an undocumented field called “reserve-hap” and that HAP could be set to “1” for true. The framework was for the “development of the ‘next generation’ of secure computing platforms.” HAP, which stands for the High Assurance Platform (pdf) program, was developed by the NSA. As Positive Technologies researchers Mark Ermolov and Maxim Goryachy poked into the firmware, they discovered an undocumented HAP field. In short, Intel does not participate in efforts to decrease security in technology.” Disable Intel ME thanks to the NSA Intel refuted those backdoor accusations, saying, “Intel does not put backdoors in its products nor do our products give Intel control or access to computing systems without the explicit permission of the end user. Yet plenty of experts have called ME a very powerful backdoor, an idea that picked up steam after a critical vulnerability was revealed in May. The purpose of ME, according to Intel, is to allow businesses to remotely manage computers via Active Management Technology (AMT). The closest successful attempt was likely the me-cleaner project. Despite many people with x86 computers trying, no one could disable ME.
0 Comments
Leave a Reply. |