What about remote provisioning? https://en.wikipedia.org/wiki/Intel_AMT#Provisioning_and_integration
What would prevent an attacker on the local network(For instance in a WiFi cafe) from: - Buy a certificate to do remote provisioning - Running a DHCP server that responds faster than the WiFi cafe's DHCP server - Remote provision the laptop they want - Then bypassing that remote provisioning
Would this work on recent AMT versions?, or is it only a concern for GM45 as this was the chipset used by Vassilios Ververis in his research?
Is it possible to gain code execution from AMT, in a programable way, to the machine trough either: - Remote storage - The keyboard
I've only old GM45 laptops that can have AMT, so I've no way to check that.
If both assumptions are correct, then worms can be a grave concern.
In the long term, I see no other way than having completely free software computers to avoid such issues. This would permit people to still benefit from security updates.
no subject
https://en.wikipedia.org/wiki/Intel_AMT#Provisioning_and_integration
What would prevent an attacker on the local network(For instance in a WiFi cafe) from:
- Buy a certificate to do remote provisioning
- Running a DHCP server that responds faster than the WiFi cafe's DHCP server
- Remote provision the laptop they want
- Then bypassing that remote provisioning
Would this work on recent AMT versions?, or is it only a concern for GM45 as this was the chipset used by Vassilios Ververis in his research?
Is it possible to gain code execution from AMT, in a programable way, to the machine trough either:
- Remote storage
- The keyboard
I've only old GM45 laptops that can have AMT, so I've no way to check that.
If both assumptions are correct, then worms can be a grave concern.
In the long term, I see no other way than having completely free software computers to avoid such issues. This would permit people to still benefit from security updates.
Denis.