L.S.
Trying to get the 0-ring on chips sort of tinkerproof by
disabling Intel Management Engine via a new method.
Probably the availability of this bit can only mean NSA requires a possibility to
de-install this attack-vector to just use it for themselves. Also consider for instance the new byte by byte load- & tinkerproof Google Titan chip.
Intel and AMD are getting at your data big time, NSA as well as we know by now from the backdoors.
In this case NSA's High Assurance Platform, a NSA trusted platform
(the bit found by researchers in the code was named "reserve_hap")
One thinks it was designed to prevent so-called "side-leaks".
OpenSSL now proven to be crappy and it took Heartbleed to become aware of the real insecure overall 'borked' situation.
So as the going is getting increasingly narrow by using
undocumented unsupported features ,
there is need for open software alternatives, to see that resource engineering
is not exclusively meantfor big goverment and big business.
Intel AMT handling now looks weird, just AMT being abused to create a worm of sorts,
and WannaCry in comparison would have been a picknick.
Open source CPU, the Chinese will facilitate (but not in the Lenovo way please). Like this:
https://www.forbes.com/sites/rogerkay/2015/03/20/openpower-unlocks-floodgates-for-an-all-chinese-server-business/POWER9CPU does not cost that much, but the maiboard is very very expensive (because of the low minimal production volumes)
Another name to mention in this context:
http://www.lowrisc.orgpolonus (volunteer website security analyst and website error-hunter)