Comment Re: "A look @ the future & the future IS now. (Score 1) 200
I had had a few beers and wanted to see how far he'd argue his nonsense :D
Traffic on ports 16992-16995 are directly intercepted by Intel AMT within the chipset before being passed to the host operating system... once Intel AMT is in a configured and accessible state.
and
Intel AMT enables reliable power control of the platform, booting for a network based ISO image, integration Keyboard-Video-Mouse (KVM), and more.
So a remote exploit could just consist of power cycling to boot from a external boot image. Only OS requests are sent to the OS, everything else is supposed to be caught at the hardware level.
Ma Bell is a mean mother!