Is this Intel Backdoor story for real?

Discussion in 'PC' started by Havana, Sep 29, 2025.

?

Yes if you think it's true.

This poll will close on Oct 20, 2025 at 11:58 PM.
  1. Yes, it's true.

    76.9%
  2. No, it's fake.

    23.1%
  1. Havana

    Havana Platinum Record

    Joined:
    May 6, 2022
    Messages:
    376
    Likes Received:
    212
  2.  
  3. Synclavier

    Synclavier Audiosexual

    Joined:
    Nov 28, 2014
    Messages:
    928
    Likes Received:
    604
    [​IMG]


    [​IMG]Yep..
     
  4. Lieglein

    Lieglein Audiosexual

    Joined:
    Nov 23, 2018
    Messages:
    1,177
    Likes Received:
    675
  5. Will Kweks

    Will Kweks Audiosexual

    Joined:
    Oct 31, 2023
    Messages:
    1,090
    Likes Received:
    738
    Is this about IME/AMT? Yeah, it's about IME/AMT.

    It's true, though this video is (as always is with these kind of clips) sensationalist, and it's been known for a long time: https://en.wikipedia.org/wiki/Intel_Management_Engine

    Widespread use in corporate environments, where remote control is assumed and used a lot. It's not a universal backdoor though, but it can be exploited. Know your adversary and adjust your paranoia levels accordingly.

    *edit* I meant to say that while it can be exploited, there are easier ways to pwn someone.

    *edit2* Fun fact: ME runs Minix which was a teaching operating system for students to learn from, including one Mr. Torvalds who got frustrated with it and started writing his own, and got into a massive flamefest with Minix's creator, Andrew Tanenbaum. It's very entertaining evening read for us nerds
     
    Last edited: Sep 30, 2025
    • Agree Agree x 2
    • Interesting Interesting x 2
    • Like Like x 1
    • List
  6. Synclavier

    Synclavier Audiosexual

    Joined:
    Nov 28, 2014
    Messages:
    928
    Likes Received:
    604
    [​IMG]
     
  7. saccamano

    saccamano Audiosexual

    Joined:
    Mar 26, 2023
    Messages:
    1,852
    Likes Received:
    806
    Location:
    CBGB omfug
    The insidious thing about IME for those non-corporate users wishing to protect their privacy from being hijacked remotely by some mischievous dickhead is that the engine for the thing works independent of the main processing architecture. In essence, what this means is that even a machine that is powered off (with the power cable still connected) can be turned on remotely and its contents ransacked by any shithead with a remote console.

    Fortunately for us, IME works with specific network ports in order for "remote" control to occur. The port mapping is a industry defined standard and IME can be more effectively disabled by simply blocking access to those ports at the firewall closest to your internet demarcation point. This would be the firewall located on your internet router or just behind your internet router. That being so you simply block those ports once (both directions) so that everything located behind that firewall is protected.
     
    Last edited: Sep 30, 2025
    • Useful Useful x 2
    • Agree Agree x 1
    • List
  8. macros mk2

    macros mk2 Rock Star

    Joined:
    Sep 22, 2022
    Messages:
    557
    Likes Received:
    485
    Location:
    seattle
    i start every song with "I AM GONNA BOMB YOU ALL" in the hopes the NSA will contact me with some encouraging words about my tunes but so far nothing. :/
     
  9. Havana

    Havana Platinum Record

    Joined:
    May 6, 2022
    Messages:
    376
    Likes Received:
    212
    Question is "is it even legal?"
     
  10. SineWave

    SineWave Audiosexual

    Joined:
    Sep 4, 2011
    Messages:
    4,673
    Likes Received:
    3,844
    Location:
    Where the sun doesn't shine.
    It's nothing new.

    IME is legal and useful, but the problem with it is that it cannot be entirely disabled. If you want it completely disabled, you disable it in the BIOS first, then disable network ports at the router, just like @saccamano said. That's at least what I know about it. I always disable it on Intel PCs not because I'm afraid of the NSA, but that other nefarious people could use it to steal my prOn. :yes:

    People like these: https://en.wikipedia.org/wiki/Mini-Me :)
     
    • Agree Agree x 1
    • Interesting Interesting x 1
    • List
  11. taskforce

    taskforce Audiosexual

    Joined:
    Jan 27, 2016
    Messages:
    2,534
    Likes Received:
    2,717
    Location:
    Studio 54
    Lemme say upfront you can disable IME but Minix is still in there and you cannot disable it. And given the circumstance, no matter if the specific to IME network ports are disabled, you can be hacked and Minix remotely enabled if you are online. You can stay completely offline if you are mad about it hehe. And because i have spoken very bad of Intel practice over the years, AMD users are not free of similar paranoia. There is unknown territory to be explored in Ryzen and all derivative cpus (Threadripper, Epyc) and it is most surely one of the same as Intel.
    Cheers mates
     
  12. PulseWave

    PulseWave Audiosexual

    Joined:
    May 4, 2025
    Messages:
    2,215
    Likes Received:
    1,236
  13. Will Kweks

    Will Kweks Audiosexual

    Joined:
    Oct 31, 2023
    Messages:
    1,090
    Likes Received:
    738
    AMD has remote management tools that work even when the system is shut down and allows system interaction that way, so they're not probably too far off. I've not clue what CPUs do this (outside EPYC), as so far there's nothing that iLO or iDRAC can't do that I've needed.
     
  14. Dan Fuerth

    Dan Fuerth Producer

    Joined:
    Nov 2, 2017
    Messages:
    163
    Likes Received:
    95
    - AMT is for Enterprise: AMT is a feature built on top of the ME that provides remote management capabilities for computers and is primarily marketed to large businesses for IT administration.


    • Embedded Microcontroller: The IME is a tiny, self-contained computer running within Intel chipsets.
    • Core System Functionality: It runs a microkernel operating system and handles various system features and services for Intel-based computers.
    • Broad Availability: It has been a standard component in Intel chipsets since 2008, not limited to specific processors or large businesses.

    As far as I am aware I worked in some IT departments and this was always a part of the Windows Active Directory ( broken down as follows):


    • Centralized Management: It allows IT administrators to manage and configure AMT-enabled PCs from a central location using familiar Active Directory tools and security models.
    • Enhanced Security: By integrating with Active Directory's security framework, you can better control access to AMT features and ensure that only authorized personnel can manage devices remotely.
    • Automated Provisioning: You can automate the process of configuring and provisioning new Intel AMT systems by defining profiles in the Setup and Configuration Service (SCS) and applying them to AD objects.
    • Simplified Operations: It simplifies tasks like discovering, deploying, and maintaining Intel AMT devices, especially in large enterprise environments.
     
    • Interesting Interesting x 1
    • List
Loading...
Loading...