[ / / / / / / / / / / / / / ] [ dir / ausneets / cafechan / had / hforce / leftpol / monarchy / sw / ztg ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Name
Email
Subject
Comment *
File
Select/drop/paste files here
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

[–]

 No.851322>>851519 >>851657 [Watch Thread][Show All Posts]

Following announcements of the Google Project Zero security exploits last week, Intel has continued to work closely with our partners with the shared goal of restoring confidence in the security of our customers’ data as quickly as possible. As I noted in my CES comments this week, the degree of collaboration across the industry has been remarkable. I am very proud of how our industry has pulled together and want to thank everyone for their extraordinary collaboration. In particular, we want to thank the Google Project Zero team for practicing responsible disclosure, creating the opportunity for the industry to address these new issues in a coordinated fashion.

As this process unfolds, I want to be clear about Intel’s commitments to our customers. This is our pledge:

Customer-First Urgency: By Jan. 15, we will have issued updates for at least 90 percent of Intel CPUs introduced in the past five years, with updates for the remainder of these CPUs available by the end of January. We will then focus on issuing updates for older products as prioritized by our customers.

Transparent and Timely Communications: As we roll out software and firmware patches, we are learning a great deal. We know that impact on performance varies widely, based on the specific workload, platform configuration and mitigation technique. We commit to provide frequent progress reports of patch progress, performance data and other information. These can be found at the Intel.com website.

Ongoing Security Assurance: Our customers’ security is an ongoing priority, not a one-time event. To accelerate the security of the entire industry, we commit to publicly identify significant security vulnerabilities following rules of responsible disclosure and, further, we commit to working with the industry to share hardware innovations that will accelerate industry-level progress in dealing with side-channel attacks. We also commit to adding incremental funding for academic and independent research into potential security threats.

We encourage our industry partners to continue to support these practices. There are important roles for everyone: Timely adoption of software and firmware patches by consumers and system manufacturers is critical. Transparent and timely sharing of performance data by hardware and software developers is essential to rapid progress.

The bottom line is that continued collaboration will create the fastest and most effective approaches to restoring customer confidence in the security of their data. This is what we all want and are striving to achieve.

-- Brian Krzanich

 No.851324

>We encourage our industry partners to continue to support these practices. There are important roles for everyone: Timely adoption of software and firmware patches by consumers and system manufacturers is critical. Transparent and timely sharing of performance data by hardware and software developers is essential to rapid progress.

please keep telling us when you figure out our backdoors so we can get our PR department on it 6 months in advance and so that I can make sure I sell my stocks in time.


 No.851326

They're going to have to bring out more heavy hitters for this.

https://www.youtube.com/watch?v=gnZ9cYXczQU


 No.851333

>Timely adoption of software and firmware patches by consumers and system manufacturers is critical.

just trust us goyim why haven't you installed our undocumented proprietary firmware blob yet.


 No.851509>>851598 >>851604

>Oh my, goyim. That old hawdware needed to be updated anyway. Now get a new computer so we can get our new firmware patches to you. Make sure to replace everything so it can be safe. Hope yah aren't still on that old Windows 7, are yah?

At least the new stuff can get patched. Time to move important information off of any old devices you still connect to the internet soon.


 No.851519

>>851322 (OP)

>issuing updates for older products as prioritized by our customers

I bet the only customers who will be listened to are big enterprises.


 No.851598

>>851509

O vey, looks like your pre-Intel ME computers are unpatchable. Such a pity!


 No.851604>>851626

File (hide): d420ee74a73602b⋯.gif (885.15 KB, 480x270, 16:9, 1437678970411.gif) (h) (u)

>>851509

Also time to buy new AMD hardware.


 No.851626>>851645

>>851604

>to defeat the botnet you have to go to another botnet

POWER 9 IS THE ONLY GOOD FUTURE

https://raptorcs.com/TALOSII/


 No.851645

>>851626

have they even shipped a single one of these? how long have they been taking pre-orders? pre-orders are always a scam.


 No.851657>>851686

File (hide): e615f397f288a46⋯.png (186.17 KB, 731x613, 731:613, Screenshot_2018-01-12_17-4….png) (h) (u)


 No.851686>>851711

>>851657

Read the source that page links to.

>To exploit this, all an attacker needs to do is reboot or power up the target machine and press CTRL-P during bootup. The attacker then may log into Intel Management Engine BIOS Extension (MEBx) using the default password, “admin,” as this default is most likely unchanged on most corporate laptops. The attacker then may change the default password, enable remote access and set AMT’s user opt-in to “None.”

The "security flaw" is the user choosing to keep the default password instead of changing it to something more secure. That's like claiming all computers, modems, wifi networks, websites, etc have a security flaw because retards use "password" as a password.


 No.851711

>>851686

The 'security flaw' is having a Management Engine in the first place.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
12 replies | 2 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / ausneets / cafechan / had / hforce / leftpol / monarchy / sw / ztg ][ watchlist ]