Researchers Hack Intel's VPro 105
snydeq writes "Security researchers from Invisible Things Lab have created software that can 'compromise the integrity' of software loaded using Intel's vPro Trusted Execution Technology, which is supposed to help protect software from being seen or tampered with by other programs on the machine. The researchers say they have created a two-stage attack, with the first stage exploiting a bug in Intel's system software. The second stage relies on a design flaw in the TXT technology itself (PDF). The researchers plan to give more details on their work at the Black Hat DC security conference next month."
Invisible Things Labs is J. Rutkowska (Blue Pill) (Score:5, Informative)
Hmm (Score:1, Informative)
The Wii has 232 bit elliptic curve encryption. While it hasn't yet been broken, someone I believe did break a 109-bit key. There isn't security that will ever exist which can't be broken.
Re:Wii Homebrew Channel (Score:3, Informative)
Yes. Google '360 timing attack'. All keys can be retrieved, at which point you can disable/bypass the encryption at any stage after the very first hardware-embedded loader signature checks.
Re:Wii Homebrew Channel (Score:5, Informative)
Someone's been living under a rock since December 2007.
I'll just point you to the recent 25th Chaos Community Congress Console Hacking talk (slides [marcansoft.com], video [tu-ilmenau.de]) which neatly summarizes a year of hacking and how much of a horrible failure Nintendo's security has been.
Spoiler: their signatures used to have 8-bit security. Literally.
We've had lots [hackmii.com] of [youtube.com] fun [wiibrew.org].
Re:Another repeat: the unlockable lock (Score:1, Informative)
Re:Wrong Wrong Wrong (Score:2, Informative)
From Wikipedia [wikipedia.org]:
Also from Wikipedia [wikipedia.org]:
In this case it means remotely changing system (BIOS) settings etc. while workstations/servers are 'powered down'. There's more to it than that, of course. Check the features list on that linked article.