diff --git a/docs/hardware/hardware-selection.md b/docs/hardware/hardware-selection.md index 3abba99..467caf4 100644 --- a/docs/hardware/hardware-selection.md +++ b/docs/hardware/hardware-selection.md @@ -37,6 +37,7 @@ Do you want: If you don't mind older/used hardware, there are some options if you do not want [PSP initialization](https://libreboot.org/faq.html#amd-platform-security-processor-psp). All new AMD hardware comes with PSP. In theory there is an option to partially disable it, but no motherboard/BIOS manufacturers have made it available yet. +Please update this if you are aware of any manufacturers that have. Form factor? @@ -51,7 +52,7 @@ DIY corebooted used [Lenovo G505s](https://www.coreboot.org/Board:lenovo/g505s) DIY or commercially available corebooted (or librebooted?) [KCMA-D8](https://www.coreboot.org/Board:asus/kcma-d8)/[KGPE-D16](https://www.coreboot.org/Board:asus/kgpe-d16). Vikings is one vendor that appears to sell these. -If used with Opteron Series 2 processors, no microcode blob is required. +If used with Opteron Series 2 processors, no microcode blob is required. However, it is still recommended to include current microcode due to vulnerabilities. ### Intel ### @@ -64,9 +65,9 @@ There are some ways to restrict Intel ME after the initial BUP. ### Intel Commercial ### -These vendors have systems available that partially disable Intel ME after the initial hardware initialization: System76, Purism, Dell. +These vendors have systems available that partially disable Intel ME after the initial hardware initialization: Insurgo ([Qubes Certified](https://www.qubes-os.org/news/2019/07/18/insurgo-privacybeast-qubes-certification/)), System76, Purism, Dell. Implementations vary, so research the vendors. -Prefer ones that use Coreboot instead of closed-source, [proprietary](https://www.kb.cert.org/vuls/id/758382) [UEFI firmware](https://www.securityweek.com/researchers-find-several-uefi-vulnerabilities). +Prefer ones that use Heads or Coreboot instead of closed-source, [proprietary](https://www.kb.cert.org/vuls/id/758382) [UEFI firmware](https://www.securityweek.com/researchers-find-several-uefi-vulnerabilities). Search the [HCL](https://www.qubes-os.org/hcl/) for a compatible system. [Search the mailing list](https://www.mail-archive.com/qubes-users@googlegroups.com/) for additional reports. @@ -89,17 +90,21 @@ Flash your system with Coreboot, including [ME_Cleaner](https://github.com/corna ### MECleaner ### +You can partially disable Intel ME while still running vendor UEFI firmware. Search the [HCL](https://www.qubes-os.org/hcl/) for a compatible system. [Search the mailing list](https://www.mail-archive.com/qubes-users@googlegroups.com/) for additional reports. -Follow the instructions [here](https://github.com/corna/me_cleaner) to partially disable Intel ME. +Follow the instructions [here](https://github.com/corna/me_cleaner). ### Unconcerned ### Search the [HCL](https://www.qubes-os.org/hcl/) for an R4.0 compatible system. [Search the mailing list](https://www.mail-archive.com/qubes-users@googlegroups.com/) for additional reports. -If selecting a desktop, you may also want to include and use a third party NIC in an expansion slot or USB instead of the onboard Ethernet. + +## Additional Notes ## +If selecting a desktop, you may also want to include and use a third party NIC in an expansion slot instead of the onboard Ethernet. +This is often not an option in laptops with manufacturer firmware due to the use of NIC whitelists, but you can use a USB based ethernet or wifi adapter instead with either desktop or laptop. +Optionally, disable DHCP on the subnet(s) your Qubes device connects to. This will help avoid overt network communications from onboard management. -This is often not an option in laptops with manufacturer firmware due to the use of NIC whitelists, but you can use a USB based ethernet or wifi adapter instead.