mirror of
https://github.com/PrivSec-dev/privsec.dev
synced 2024-12-22 21:01:34 -05:00
Update content/posts/hardware/Misinformation on x86 Hardware/index.md
Co-authored-by: friendly-rabbit-35 <169707731+friendly-rabbit-35@users.noreply.github.com> Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
parent
44c6226a38
commit
f5aaf2bab0
@ -26,7 +26,7 @@ By buying hardware with Intel CSME disabled, you are **increasing the attack sur
|
|||||||
|
|
||||||
I am not aware of any way to disable AMD PSP, but even if this was possible, all that it does is deprive you of useful security features.
|
I am not aware of any way to disable AMD PSP, but even if this was possible, all that it does is deprive you of useful security features.
|
||||||
|
|
||||||
This excercise also achieves absolutely nothing to protect against a hypothetical scenario where Intel and AMD are malicious. Intel and AMD do not need the co-processor to implement a backdoor - they can simply introduce CPU vulnerabilities like Spectre and Meltdown if they want to. If you do not trust a CPU vendor, the only mitigation is to not use said vendor.
|
This exercise also achieves absolutely nothing to protect against a hypothetical scenario where Intel and AMD are malicious. Intel and AMD do not need the co-processor to implement a backdoor --- they can simply introduce CPU vulnerabilities like Spectre and Meltdown if they want to. If you do not trust a CPU vendor, the only mitigation is to not use said vendor.
|
||||||
|
|
||||||
### Intel AMT and AMD DASH
|
### Intel AMT and AMD DASH
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user