34 private links
Some of the claims we plan to cover:
• It's a backdoor made for NSA and serves no useful purpose
• It is always on even if the PC is turned off
• It can read all data on PC/spy on the user
• It can't be disabled
• It can lock the PC with a command sent over the air
• It a black box which can't be audited because it's closed source
• End users can't do anything about it.
You can audit it even without source code (and maybe even without reverse engineering).
The firmware size is greatly reduced:
Original Modified
Generation 2 1.5 MiB / 5 MiB 84 KiB
Generation 3 2 MiB / 6.6 MiB 330 KiB
What stuff of ME things are working and what not
People often think that if they’re managing data responsibly, then they’re also respecting privacy requirements. However, while often thought of as interchangeable, data security and user privacy are in fact not the same thing. They have a common goal to protect sensitive data, but vary greatly in their approach.