>>2855>2018/05/30>hey hey guys pst psst>did you hear about this very new cool technology for spying you>totally fresh news of current year, my fellow hackers>it's called Intel AMT
Also, you missed the board. This is a board for anarchist highschoolers who like science fiction, not a hardware security discussion board.
>As long as the power supply is available and and in working condition, it can be woken up
As long as power cord is plugged in, your PC is not actually off, it's a common knowledge since ACPI states been introduced.>Core vPro processors work in conjunction with Intel’s new Anti Theft 3.0, which put 3g connectivity into every Intel CPU after the Sandy Bridge version of the I3/5/7 processors
Wrong. The anti-theft works only with dedicated 3G modem, a SIM card and service subscription. Another similar technology on older laptops called Computrace was basically half-assed boot malware that didn't work on anything beyond windows XP. In order to have a good 3G connection, a dedicated modem with antenna is needed plus agreement with literally every carrier in the world to accept their embedded SIM, even Amazon doesn't have that.>he writes
Writes who? Cite your sources, I'm not going to waste my time duckducking that.
The main thing is, you don't even tell us or know about year-old AMT vulnerabilities. Friggin bizarre innit, this thing hosts a web server right in your ring -3 and lets anyone login when using blank password after fucking with GET requests. https://www.intel.com/content/www/us/en/architecture-and-technology/intel-amt-vulnerability-announcement.html
The antenna might be there, an in fact soon will be there, look at latest mobile processor datasheets. But, you can always: put a Faraday hat on it, plug off the power cord, use ARM/MIPS router no PFSence for you, BSD sweeties
with freedom firmware and range ban Intel IPs, forbid all external connects, and not plug malicious devices on same local network.