https://www.scmagazine.com/debugging-mechanism-in-intel-cpus-allows-seizing-control-via-usb-port/article/630480/?
Yet another NSA backdoor found.
You just need to access to a USB 3.0 port.
(((Intel)))
Found your problem.
>reported to Intel
Working as intended, won't fix.
How do those work anyway? I plug in my Super Intel Universal Serial Bus Mass Storage Device and it just boots into os without asking for password? Or is there a total commander in every intel chip hat would allow me to steal user data?
>>58422879
JTAG
>>58422879
There's another low level CPU running in ring zero alongside the Intel host chip. It's invisible to the intalled OS and has complete access to the host CPU, memory, storage and data.
>"As of today, this mechanism can be exploited only on Intel U-series processors.”
Kaby won't have this problem.
Another reason to upgrade your machine.
>>58423026
It only works on U processors from the 6xxx series currently, so literally not an issue.
Not sure if kabylake U series have it as well, but even so, not a big deal for 90% of people.
>>58422931
If the data was encrypted would it be able to decrypt it?
>>58423713
Not if you're using a TPM or a USB key + pin setup.
>>58422942
It's a big exploit.
>>58423779
That only works on ultra low power mobile and NUC CPUs.
So desktop users are 100% unaffected and high powered laptops are equally unaffected.
>>58422829
>need to access to a USB 3.0 port
I couldn't care less about any sort of bug that requires physical access to the machine, because if anybody other than you has physical access to your machine you don't have any real security.
>>58423779
For you