Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This PDF might be news to many; click 'past' to see previous submissions -- last month's got traction:

[dupe] https://news.ycombinator.com/item?id=16015539 (543 points, 107 comments)

HN user saulrh mentioned that the list of requirements "does not seem incredibly unusual" for enterprise setups with AMT on.

Pre-Meltdown/Spectre this was 2017's "big deal" re:Intel; nearly all of the varying degrees of paranoia in the previous discusson seem a lot more reasonable with the benefit of hindsight. (If any more AMT info has become available thanks to Meltdown/Spectre-enhanced reverse engineering I would appreciate a heads-up; example vs SGX: https://github.com/lsds/spectre-attack-sgx)



I thought it's not possible to paste the same link twice in HN, yet this appears for the 3rd time, as far as my memory permits.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: