Here is the recording of my talk on the #IntelME:
Please file issues/send PRs if you have any ideas.
Amd sorry, my timing was bad, so this was mostly focusing on platform basics to get into the field. I will do better again at @fosdem in the Open Source #Firmware devroom, I promise!
Big thanks to @west for the great stage! \o/
@purlupar no, actually the pun was by @CyReVolt.
Yeah, I have to admit I sadly haven't seen any people from this state being active in the fediverse yet.
Ummm, if you look through my toots you'll find something about LinuxDay. This year was my second time in the orga team, so yeah, I've been there a couple of times. :-D
Btw: videos of this year's talks from LinuxDay are on https://peertube.luga.at/
Intel just released CSME firmware to patch CVE-2020-8705, my FPGA assisted Bootguard bypass when waking the system from S3 sleep. Full writeup: https://trmm.net/Sleep_attack/
Die englische Wikipedia hat eine aktuellere List bzw. Übersicht mit Custom-ROMs für Android.
Do you see the unpopulated solder joints next to the red marker?
This is another board. I measured 1kOhm on the resistors that are on the board in the first picture. I can just bridge the joints to get the UART here as well. :)
Nun ist es fast vorbei, aber hat auf jeden Fall mega viel Spass gemacht und ich vernasch jetzt meinen #Limettenkäsekuchen aus dem #Workshop #BugfreiesBacken bei der #LNI (#LocationNotIncluded).
Infos zum Nachbacken unter https://wiki.das-labor.org/w/Location_not_included_2020/Backen
Danke an die Ideenlieferanten @CyReVolt und @Elektrollart!
This doesn't even look suspicious after reassembly.
Quite some time later now, Intel have published their whitepaper: https://www.intel.com/content/dam/www/public/us/en/security-advisory/documents/intel-csme-security-white-paper.pdf
Such a simple idea, though it took a while for me to have it: If you have no #password to log into an #embedded #Linux, but you do have UART and U-Boot access, add "single" to the kernel command line.
The SPI programmer couldn't read the flash in-system. Dumping /dev/mtd* to an SD card is easy.
In the next step, I will copy out the modules for wi-fi and build a u-root image ready to chroot into. That is something for next week though. I am already satisfied and happy with this achievement. \o/
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!