[Cryptography] Intel Management Engine pwnd

Ryan Carboni ryacko at gmail.com
Wed Nov 29 18:38:55 EST 2017


>
> It uses a built-in, on-chip NIC.
>
>
So you're saying this violates the end-to-end principle?
It should be requesting it's own IP address and possess it's own MAC, if
active.

Seems like someone dropped the ball in the Trust Computing Group.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20171129/b9cb9739/attachment.html>


More information about the cryptography mailing list