Comment Re: "A look @ the future & the future IS now. (Score 1) 200
I had had a few beers and wanted to see how far he'd argue his nonsense :D
Traffic on ports 16992-16995 are directly intercepted by Intel AMT within the chipset before being passed to the host operating system... once Intel AMT is in a configured and accessible state.
and
Intel AMT enables reliable power control of the platform, booting for a network based ISO image, integration Keyboard-Video-Mouse (KVM), and more.
So a remote exploit could just consist of power cycling to boot from a external boot image. Only OS requests are sent to the OS, everything else is supposed to be caught at the hardware level.
"Pay no attention to the man behind the curtain." -- The Wizard Of Oz