Initially I did not believe it, thought it must be hype or hoax.

Nope, it is a rootkit in hardware.

http://www.intel.com/business/vpro/index.htm

: :     Isolate security tasks—in a separate
: :     environment that is hidden to the user
: :
: :     [...]
: :
: :     Perform hardware and software inventory on
: :     PCs—even if they don't have management
: :     applications installed or they are powered
: :     down, which increases reporting accuracy for
: :     licensing, maintenance contracts, and audits.
: :
: :     Deploy software patches to PCs more
: :     efficiently—even if they are powered down or
: :     their OS is inoperable, without disrupting or
: :     slowing down the user's workflow.

(The last paragraph means "without the user knowing, and even if the user is doing his best to stop you")

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to