- Joined
- Dec 29, 2010
- Messages
- 3,819 (0.75/day)
Processor | AMD 5900x |
---|---|
Motherboard | Asus x570 Strix-E |
Cooling | Hardware Labs |
Memory | G.Skill 4000c17 2x16gb |
Video Card(s) | RTX 3090 |
Storage | Sabrent |
Display(s) | Samsung G9 |
Case | Phanteks 719 |
Audio Device(s) | Fiio K5 Pro |
Power Supply | EVGA 1000 P2 |
Mouse | Logitech G600 |
Keyboard | Corsair K95 |
If I have admin rights on a PC with an Intel chipset, can I not flash tha BIOS with a malware infected version or do Intel CPU's detect that tampering?
Hell yes. This brings up many questions that are not asked by this article so let me try...
By its own statements, CTS Labs tested and developed a proof of concept exploit for Asmedia controllers before it was aware these controllers were incorporated into Ryzen chipsets. Where, then, is the website AsmediaFlaws.com? Where’s the notification to tell Intel motherboard customers that the chips on their motherboards can be similarly backdoored and abused? This isn’t a theoretical; I’m writing this article from an Ivy Bridge-E system powered by an Asus X79-Deluxe motherboard with an Asmedia 1042 controller.
Where is TPU in this?
https://www.extremetech.com/computi...ty-disclosures-digs-deeper-hole#disqus_thread