Intel ME vulnerable to HTTP exploit, allows arbitrary code execution

TEMPLEBIOS WHEN

Attached: [Erai-raws]_Boku_no_Hero_Academia_3rd_Season_-_06_[720p][Multiple_Subtitle].mkv_snapshot_13.13_[2018.05.12_16.55.25].jpg (1280x720 304.44 KB, 1.19M)

I like the ocs, I own the a500

I really should move to using ppc.

Attached: 493a374d5e1a90d4e002f5bde7c95dff-imagejpeg.jpg (599x671, 170.25K)

So using core/libreboot will stop all these intel exploits for sure or does it "totally removes everything bad trust me"?

That's an actually good idea.
Or, we just go back to legacy BIOS.

...

Coreboot and Libreboot are software BIOS replacements. The Intel exploits are CPU level exploits meaning that the exploits run on the CPU without regard to any software booted such as the software BIOS or even the operating system.

gives (((them))) access to whatever I do and money
wat do

I guess I should have already given my 4790K a Viking funeral. My old Q9550 system probably isn't safe either.

It doesn't fix problems with intel's microcode but it does fix issues with ME and AMT, since on librebootable platforms ME can be completly removed and on corebootable platforms it can be "cleaned". Cleaned means it's still there, but it's gutted in such a fassion it has just enough code to boot up ME's processor, but then goes into a running error state. This way when the CPU sees ME's heartbeat and thinks everything is good. It doesn't know ME is just sitting there drooling on the carpet.