[Cryptography] Intel Management Engine pwnd
Ryan Carboni
ryacko at gmail.com
Wed Nov 29 18:38:55 EST 2017
>
> It uses a built-in, on-chip NIC.
>
>
So you're saying this violates the end-to-end principle?
It should be requesting it's own IP address and possess it's own MAC, if
active.
Seems like someone dropped the ball in the Trust Computing Group.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20171129/b9cb9739/attachment.html>
More information about the cryptography
mailing list