Intel Processor Backdoor or Bug? New Vulnerability + Solutions: Management Engine (Privacy/Security)

Rindfleisch
Published on Jun 6, 2021
NEW: 'bug' discovered in Intel Processors allowing someone to control/add code (like malware) into your processor. We've known for some time Intel processors have an extra hidden processor running a hidden OOB (Out of band) IP network utilizing the inbuilt wifi card. I go over the latest discovered potential bug/backdoor and solutions/mitigation for that pesky Intel Management Engine.

Is AMD a solution here? I would say a hard NO: Absolutely NOT a "fix". AMD has many of the same problems with its own customers locked out of disabling proprietary closed source "security processor". If the hardware manufacturer is not giving you choice on hidden access options: RUN. Run far far away!

If you want to see more like this let me know in the comments!

I posted a Public Post for everyone with additional thoughts/details including a potential (unverified) whistleblower's post at: https://www.buymeacoffee.com/politictech/new-intel-processor-bug-backdoor-intel-management-engine-mitigations

I am one who believes (where possible) we should use hardware we have the right to see what it is doing, even if we never bother to look (open source). If it is not open source you do not own it: it owns you.

While ARM is not open source, there is less risk IMHO. I make suggestions including moving routers/firewall to ARM/RISC-V machines.

We talk about solutions to disable functionality of Intel Management Engine. This includes my own personal idea, coming from my own research on IME.

Like this video, Share it, And Subscribe to show me you care about videos like this! And I will respond with more original content.

Register for Odysee account using my invite link: ' https://odysee.com/$/invite/@RTP:9​ '

If you want to buy me a coffee sometime, I'd love that: https://www.buymeacoffee.com/politictech Extra personal blog posts can be found there as well for supporters + public blog posts

-------------------------------------------------------------------
MY PAGES/LINKS/EXTRAS:

VIDEO MIRRORS:
Blog: https://politictech.wordpress.com​​​​​
BMAC: https://www.buymeacoffee.com/politictech​ (Support my work/channel by buying me a coffee)
ODYSEE VIDEO/FILE CHANNEL: ' https://odysee.com/@RTP:9​ '
PEERTUBE DECENTRALIZED: https://tube.tchncs.de/accounts/rtp_tips​
BRIGHTEON: https://www.brighteon.com/channels/righttoprivacy
BITCHUTE: https://www.bitchute.com/channel/yourprivacytv
BRANDNEWTUBE: https://brandnewtube.com/@RightToPrivacy​ (NEW)

https://www.gitlab.com/Aresesi:​​​​ some of my stuff (see my above Odysee for file downloads as well- most updated always found on gitlab (here))
https://www.github.com/RightToPrivacy​ (privacy scripts and more)

Custom Routers/Secure/Private Nextcloud setups. I believe in the right to privacy as a basic human right (Universal Declaration Human Rights (#12))..
For more info: righttoprivacy[at]tutanota.com

--------------------------------------------------------------------------------

TIMESTAMPS:
00:00 New vulnerability
01:04 Intel mangement engine
02:34 Intel Management Engine Mitigation
03:05 Latest backdoor possibilities
03:35 More details on OOB IME
04:07 MEI Device: Linux systems
04:49 Intel MGMT Engine Privacy Tips
05:54 IME Solutions Including One I came up with


DEVICES/SOFTWARE USED TO MAKE THIS VIDEO:

Video Made In KDENLIVE: https://kdenlive.org​​​​​
Computer Video Editing using Parrot Linux www.parrotsec.org

#Intel #Processor #Bug #Backdoor #Management #Engine #Vulnerability #Exploit #News #Security #Infosec #Cybersecurity #Remote #Local

Share Video

  • 560 x 315
  • 640 x 360
  • 853 x 480
  • 1280 x 720

Add to

Flag Video

Rate video

Rate video

Up next
Autoplay