Quote from: ghkion on August 12, 2024, 00:20:32The only addition is this can inject a nasty code that user can't get rid of, seemingly can't remove it even with OS reinstall and BIOS re-flash.
This is just complete technical nonsense, designed for stupid laymen. If an exploit is able to penetrate NVRAM or even flash into EPROM, then there is always the same opportunity to remove it from there without a programmer.
The funniest thing is that the EPROM chip in principle should not accept patched firmware that does not have a digital signature of the BIOS (motherboard) manufacturer. And where do hackers get private parts of the digital signature? Stole from motherboard and laptop manufacturers?
If this method bypasses even the digital signature check, this purely indicates a bookmark for second-level special services, since the first level is AMD PSP/Intel ME itself, which is not documented anywhere.
In principle, if you look at all x86 since 2006, you are NOT the owner of your PC/laptop, for a banal reason - on each motherboard (except for those that are clearly going to government agencies with an indication to disable PSP/ME) a ??PSP/ME coprocessor is installed, which allows you to completely control your property remotely by unknown means at the whim of the manufacturer and the special services of countries dedicated to its details to the end.
We have all been living in a digital concentration camp for a long time. However, most stupid ordinary people have long been fish in an aquarium voluntarily with their smartphones - which are ideal spy probes. The horror of the situation is that the "fish" do not even understand, due to the mentality imposed on them from above since childhood - that they are in an "aquarium" controlled from above, and those who are above, above the laws and rules ...