Intel Management Exploits

Will I be safe from Intel Glow Engine remote exploits if I use me_cleaner? How do I block it from randomly contacting glowie servers and my firewall thinking it’s okay to allow the glowie to connect back?

Terry Davis: They Glow, You Shine Shirt $21.68

It's All Fucked Shirt $22.14

Terry Davis: They Glow, You Shine Shirt $21.68

  1. 6 days ago
    Anonymous

    Totally. Go for it :^)

  2. 6 days ago
    Anonymous

    spoonfeed:
    me_cleaner removes rom backdoors
    ie supply chain or physical attacker could write bootkit to your rom
    me_cleaner does not remove backdoor instructions to reach godmode
    cpu backdoors are not really remotely exploitable, they have easy ways to hack you with rce through some software you rely on
    then they god mode to ring minus six six six and write and read whatever memory they want

    here is practical guide on all you need to know
    https://desuarchive.org/g/thread/83699083/#83700607

    • 6 days ago
      Anonymous

      It was good until the SELinux part. Just check who is behind that lol

      • 5 days ago
        Anonymous

        there are different MAC you can use if you wish

  3. 6 days ago
    Anonymous
  4. 6 days ago
    Anonymous

    >How do I block it from randomly contacting glowie servers
    by not giving it an IP

    • 6 days ago
      Anonymous

      It’s gonna steal the IP of the computer anon.

      • 6 days ago
        Anonymous

        No, the ME has its own MAC address and gets its own IP.

  5. 6 days ago
    Anonymous

    The scrubbing or neutering of ME with me_cleaner only works up to 5th gen intel or something. After that you might be able to set the HAP flag but that could be ignored and attract more attention. Coreboot with me_cleaner might do the trick

  6. 6 days ago
    Anonymous

    I love her design. She's so cute.

  7. 6 days ago
    Anonymous

    Do chinese aliexpress boards with custom bioses also have those vulnerabilities? You'd think the Chinese would try to patch them out.

    • 6 days ago
      Anonymous

      nah you bet they are only concerned about how quickly they can bring their product to market. The CPU core checks signatures of parts the ME on the BIOS/UEFI and if those are missing it will self-ack any further CPU initialisation. or it becomes unstable and crashes every 30 minutes.

  8. 6 days ago
    Anonymous

    Nkds

  9. 6 days ago
    Anonymous

    I wanted to make a router with pfsense/openBSD on a normal CPU but now I am scared.

    • 6 days ago
      Anonymous

      https://pcengines.ch/apu2.htm
      coreboot support, ecc ram
      >pfsense
      botnet
      >openBSD
      botnet
      make your own linux distro or bsd or some microkernel

  10. 6 days ago
    Anonymous

    >How do I block it from randomly contacting glowie servers
    the first step is to determine that it's doing this by monitoring network traffic, and then blocking that traffic. (psst, it's not doing this and you are unnecessarily paranoid)

    • 6 days ago
      Anonymous

      >psst, it's not doing this
      Proof?

      • 6 days ago
        Anonymous

        The burden of proof is on the person saying it does that. There is zero proof that the management engine is backdoored in a way that would allow network traffic, no less by government agencies, no less casually. That which is asserted without evidence can be dismissed without evidence.

        • 6 days ago
          Anonymous

          >le burden of proof
          >le epic quotes
          The anon asserted it doesn’t do that so he has to provide proof.

          • 6 days ago
            Anonymous

            No, that is not how the burden of proof works. The allegation is that the ME is backdoored, and that it spies on user activity, and sends information over the internet about that user activity. Prove any of those allegations, or shut the frick up.

          • 6 days ago
            Anonymous

            >le burden of proof
            Cope. The OP does not claim IME has those powers, but only asks about mitigating a possibility, while

            >How do I block it from randomly contacting glowie servers
            the first step is to determine that it's doing this by monitoring network traffic, and then blocking that traffic. (psst, it's not doing this and you are unnecessarily paranoid)

            claimed it DOES NOT do that, so now proof has to be provided for the asserted claim.

            Basic knowledge of how TCP works is "proof"

            Elaborate.

          • 6 days ago
            Anonymous

            again that is not how the burden of proof works you absolute moron holy shit how fricking goddamn dumb are you

          • 6 days ago
            Anonymous

            >le burden of proof
            Stop appealing to invalid made up concepts instead of giving an argument. (even if it was valid the anon claiming that X doesn’t do Y has to provide proof, not the anon inquiring about the possibility of blocking X from doing Y).

            >it DOES NOT do that, so now proof has to be provided
            That's not how it works. YOU post a pcap showing it DOES do that.

            OP does not definitely claim that it does. This is a strawman. OP only asks about exploits and how to block potential remote exploits, but the other post claims it does not do that so blocking is pointless.

          • 6 days ago
            Anonymous

            >Stop appealing to invalid made up concepts instead of giving an argument
            you are profoundly mentally moronic and should have a nice day at the earliest possible convenience to ease your burden on society

          • 6 days ago
            Anonymous

            404 argument not found. Ok, justify this concept then and show how it applies here. But it doesn’t, even if it was valid the anon who claims IME has certain properties has to show proof for his claims.

            >giving an argument
            Argument: Post a pcap.

            I’m not the one making a claim, only asking for proof from

            >How do I block it from randomly contacting glowie servers
            the first step is to determine that it's doing this by monitoring network traffic, and then blocking that traffic. (psst, it's not doing this and you are unnecessarily paranoid)

            for his extraordinary research-tier knowledge about the IME and how it’s not doing certain things.

          • 6 days ago
            Anonymous

            >claims others are using logical fallacies
            >uses logical fallacies
            The absolute state of this board.

          • 6 days ago
            Anonymous

            [argument not found]
            Post the logical fallacy. Is asking for justification of extraordinary claims (IME does not do X) a fallacy? Or is it not accepting appeals to reddit-tier phrases as replacements for an actual argument? I never claimed anyone committed a logical fallacy either, I’m merely trying to get justification for a claim.

          • 6 days ago
            Anonymous

            I am deeply ashamed that it took me four replies to figure out that you're just trolling and not actually trying to make a coherent or cogent argument.
            Here's the bottom line for anyone here reading this shit in good faith: There is no proof whatsoever that the ME is compromised. There is conjecture and speculation, and that's the current extent of it. Nobody has ever observed the ME doing anything that Intel doesn't say it does, which is act as a system management tool, like IPMI only more moronic.

          • 6 days ago
            Anonymous

            > Nobody has ever observed the ME doing anything that Intel doesn't say it does
            That’s not even the problem here, nobody says it’s designed as a back door, only that it could have “accidental” vulnerabilities in it. There’s no good reason to trust Intel (alphabet boys don’t use IME and have it disabled just for lolz I guess?) and to believe it doesn’t have these so it’s logical to inquire about preventing its effects.

          • 6 days ago
            Anonymous

            youd better make sure you keep it up to date with all new patches then

          • 6 days ago
            Anonymous

            >giving an argument
            Argument: Post a pcap.

          • 6 days ago
            Anonymous

            >it DOES NOT do that, so now proof has to be provided
            That's not how it works. YOU post a pcap showing it DOES do that.

          • 6 days ago
            Anonymous

            i could walk you through the process of how i overcame my IME paranoia but i wont

          • 6 days ago
            Anonymous

            How do I take the blue pill anon?

          • 6 days ago
            Anonymous

            step 1 - buy a 10/100 ethernet hub and run wireshark on another computer

          • 6 days ago
            Anonymous

            Basic knowledge of how TCP works is "proof"

    • 5 days ago
      Anonymous

      Intel ME has exactly 0 chances of affecting your life. Its a boogeyman for schizoids and /misc/ tourists who unironically think that CIA is after them. Keep in mind that using ME cleaner on a regular hardware might render your computer less usable or completely brick it. Unless you are actually chased by some special forces, security of your hardware is something you shouldnt care about. You are more likely to get hacked by a random 3rd worlder who compromised your gmail with credential stuffing. Read the following book.
      https://anonymousplanet.org/
      >How do I block it from randomly contacting glowie servers
      It literally doesnt do that. Note that everytime you ask some me schizo about it, they never give any decent answer.

      The burden of proof is on the person saying it does that. There is zero proof that the management engine is backdoored in a way that would allow network traffic, no less by government agencies, no less casually. That which is asserted without evidence can be dismissed without evidence.

      vPro ME definitely calls out to internet servers because that's one of the features it's sold with. Now does consumer ME do anything on its own? Has any security researcher ever written up a blog about how they looked for benign ME requests for the time and found nothing? Is Windows trusted to handle the remote part of any ME exploit? Who knows.

  11. 6 days ago
    Anonymous

    Intel ME has exactly 0 chances of affecting your life. Its a boogeyman for schizoids and /misc/ tourists who unironically think that CIA is after them. Keep in mind that using ME cleaner on a regular hardware might render your computer less usable or completely brick it. Unless you are actually chased by some special forces, security of your hardware is something you shouldnt care about. You are more likely to get hacked by a random 3rd worlder who compromised your gmail with credential stuffing. Read the following book.
    https://anonymousplanet.org/
    >How do I block it from randomly contacting glowie servers
    It literally doesnt do that. Note that everytime you ask some me schizo about it, they never give any decent answer.

    • 5 days ago
      Anonymous

      Intel oppies a data leak with the documentation for the ME. Hackers now have total control over every intel CPU made in the last 20 years.
      Don't worry about it.

  12. 6 days ago
    Anonymous

    If you had maps of nuclear silos or financial data for black ops using me_cleaner wont stop them from just planting child porn on your pc you know.

  13. 6 days ago
    Anonymous

    [...]

    linux libre really isnt
    i also said make your own bsd or microkernel

  14. 6 days ago
    Anonymous

    [...]

    >BSD isn't a lintroon distro that you have to "make"
    ...?
    i said make your own bsd
    aka the own kernel and userspace for it
    YOU FRICKING MORON
    >Linux is fraught with security problems and backdoors
    minimal kernel config, hardened sysctl, linux libre
    priv esc backdoors wont matter for a firewall, you can even run everything as root and mitigations=off and nothing will happen because it will only firewall traffic

    • 6 days ago
      Anonymous

      >make your own bsd
      It won't be a true BSD because OpenBSD is the true BSD.
      >priv esc backdoors wont matter f
      Ah, so that's it. It Le doesn't matter, kek. What a joke of an OS.

      • 6 days ago
        Anonymous

        >It won't be a true BSD because OpenBSD is the true BSD.
        moron
        >Ah, so that's it. It Le doesn't matter, kek. What a joke of an OS.
        yes because it wont be remotely hackable as it will be purely firewall, what else do you not get?

        >minimal kernel config, hardened sysctl, linux libre

        works on my machine

    • 6 days ago
      Anonymous

      >minimal kernel config, hardened sysctl, linux libre

  15. 6 days ago
    Anonymous

    do you keep navigation info to this computer of yours on computer or are you worried about words you type or you have maybe lewd anime pic on your computer that makes you think of me overlords

  16. 6 days ago
    Anonymous

    You are genuinely naive.

  17. 6 days ago
    Anonymous

    does anyone know if me cleaner supports 13th gen?

  18. 6 days ago
    Anonymous

    You know that a hypothetical IME backdoor could remain 100% passive until an attacker sends you a magic packet, right? To observe the backdoor, you would have to literally get attacked by the NSA or something.

  19. 6 days ago
    Anonymous

    switch to POWER, ARM, RISC-V as soon as possible
    M1 MBP will be the librebooted Thinkpad X200 of this era

    • 6 days ago
      Anonymous

      >librebooted macbook
      I can’t wait. What’s the status on this?

    • 6 days ago
      Anonymous

      At least ARM use UEFI fricking garbage. Don't know what POWER does. RISC-V would probably also use UEFI on PC-class hardware because of PC brainrot.

    • 5 days ago
      Anonymous

      https://www.raptorcs.com/BB/
      a good POWER9 desktop option just super expensive, hopefully more people start making them

  20. 6 days ago
    Anonymous

    The supposed backdoor in ME has been around for over a decade, has anyone actually confirmed it has been figured out by unrelated people? Who knows how to exploit ME other than Intel?

    This discussion is years old, but has anyone actually figured out ME? Some actual hard evidence would be nice.
    Clearly the main people actually using ME are corporations supervising employees. Y'all cheer on whistleblowers and insiders that provide leaks, but their managers and the corpos they are backstabbing fricking don't at all, and they are the ones interested in spying on computers belonging to the company that are in the hands of employees to make sure they don't step out of line. Feds will want to spy on you if pick up government secrets or are gathering support for a terrorist attack and stuff, they don't care about some smelly NEET living on mental disability checks.

    • 5 days ago
      Anonymous

      > employees. Y'all cheer on whistleblowers and insiders that provide leaks, but their managers and the corpos they are backstabbing fricking don't at all, and they are the ones interested in spying on computers belonging to the company that are in the hands of employees to make sure they don't step out of line.
      so damn stupid
      have you worked anywhere ever?
      im sorry if thats rude
      but access to anything of whistleblower value is getting tracked at the server, not somebody shadow ghosting what you do on your windows gui shit.
      also you can fricking use anything other than your work computer to whistleblow
      its 2024 and computers are quite ubiquitous
      jesus christ
      please expose your paranoid hallucinations to some reality checks every once in a while

      • 5 days ago
        Anonymous

        No, never worked for some big corpo, but then what's the point of ME? Intel pitches it as a security feature for remote management and anti-theft. Obviously, theft of corporate property, which will entail sensitive data, is an obvious concern. Overkill for some machine that the company can easily replace if stolen but has no sensitive data.
        If I'm so stupid, then so must be the big corpos using ME, and Intel made a security feature for their peace of mind.

        You also cannot refute (like any anon) that no one is going to be interested in some random IQfy shitposter and whatever porno and pirated software he might have. Literally a some nobody of no consequence. It's moronic to go after some nobody when there is an infinity of greater priorities for every company and the government. but none of this is anything other anons haven't brought up.

        The bigger question that actually CAN affect us all with Intel hardware: has anyone outside of Intel actually managed to exploit ME? Or people have spent years worrying about some hypothetical situation that has yet to occur?

        • 5 days ago
          Anonymous

          IME is baked into the chips/sets bc itd be a fricking headache to get them out or manufacture two lines

          IMEs in there to manage computers because in a world where business is computerized you want to be able to access that shit. bc it may be hella fricking important to your business. its not there for fricking shadow ops, least of all bc itd be super simple to just block whatever port range IME speaks over from propagating packets throughout your home network.

          which is something, you know, you cant do (or get fired for doing) when youre working on office LAN.

          • 5 days ago
            Anonymous

            >whatever port range IME speaks over from
            *blocks outgoing traffic on ports 80 and 443*
            nothing personal, kid

          • 5 days ago
            Anonymous

            oh? port 443? really? how does ime update root ssl certificates in the ROM? tell me

        • 5 days ago
          Anonymous

          >has anyone outside of Intel actually managed to exploit ME?
          There have been vulnerabilities. The coolest one is probably logging into the admin webserver from LAN using a blank password.

  21. 5 days ago
    Anonymous

    Only before 6th gen. After that a large portion of ME is needed to run your PC and neutering it doesn't do much.

    • 5 days ago
      Anonymous

      ……….before ps2 and xbox??? why??

      • 5 days ago
        Anonymous

        It's not used to run your computer it's used to boot your computer.
        Why did they do that? Because Intel is moronic and thinks their backdoor into every CPU will never be figured out by governments or hackers.

      • 5 days ago
        Anonymous

        6th gen intel i processors.

  22. 5 days ago
    Anonymous

    But really, which IP address does the back door use to phone back home?

    • 5 days ago
      Anonymous

      >But really, which IP address does the back door use to phone back home?
      It doesn't phone home it waits for commands.

      • 5 days ago
        Anonymous

        How does it receive the commands if the computer is behind NAT?

        • 5 days ago
          Anonymous

          >How does it receive the commands if the computer is behind NAT?
          All network traffic your computer processes is read looking for it's instructions.
          Or maybe I should say it uses the computer's network interface. The sales reasons for the ME is to allow remote administration of the system. Letting network owners conduct operations to all their computers so long as they have at least standby power to the system.

  23. 5 days ago
    Anonymous

    Works fine on my M3.

Your email address will not be published. Required fields are marked *