Intel To Release Next-Gen BIOS Code Under CPL 224
An anonymous reader writes "Intel said today that it plans to release the 'Foundation code' of its next-generation firmware technology -- a successor to the PC BIOS -- under the Common Public License (CPL), an open source license, later this year. More than 20 years old, the BIOS (Basic Input-Output System) is the oldest software technology in PC platforms. Intel says its firmware Foundation code, a result of a project codenamed Tiano, 'provides that the successor to the BIOS will be based on up-to-date software technology.' The Foundation code is designed to be extended with new features and services, such as improved platform manageability, serviceability, and administrative interfaces which are too complex to implement in the old BIOS environment, according to Intel."
An ode to DRM FUD (Score:5, Interesting)
Re:An ode to DRM FUD (Score:5, Funny)
Re:An ode to DRM FUD (Score:4, Insightful)
I do have confidence in the Open Source hacker army, though, and that if there's a way, they'll figure it out.
Get our minds right first and last. (Score:5, Insightful)
Re:Get our minds right first and last. (Score:4, Insightful)
Not all DRM is bad, or broken, or required. We have rights, after all, and management of their digital representations is necessary in our increasingly digital environment. But an inaccurate model of our rights, and our transactions within them, will deny those rights. And that will further undermine the model. Leaving us with a world even less inhabitable than now, when these technologies are pursued with exactly the opposite values. So we must be careful how we begin, or it will be a lost cause from the start.
Re:Get our minds right first and last. (Score:5, Insightful)
I think you have far too much faith in these systems and a fundamental misunderstanding of what copyright is meant to protect. First, already in combination with laws like the DMCA, DRM is used to deny fair use rights--to state the most obvious example, but by far not the most important. Second, you fail to realize that the purpose of copyright is to encourage progress, not protect 'creations.'
This is because American copyright, as envisioned by the Framers, rejects any moral or property protections and relies instead on a way of viewing creative progress as what I would call a 'collaboration' between generations. Each subsequent generation must have free access to the previous generations' works in order to build upon them. It is thus an essential function of any rational society or system to not impede progress by essentially granting a single generation full control to lock out future generations.
But of course, copyright doesn't allow this anyways, as I spent the last paragraph stating, because it misunderstands that copyright is a protection of some sort of inherent 'right' in the act of creation rather than a protection of progress through balanced public and private rights. In actuality, the more dangerous effect of DRM is that copyright itself becomes obsolete in a DRM-capable world. Companies need only decide what allowances they want to give to consumers through technology, and the balancing effect of the law dissappears.
so much for preview (Score:3, Insightful)
Should be:
"But of course, copyright doesn't allow this anyways, as I spent the last paragraph stating, because that would misunderstand copyright to be a protection of some sort of inherent 'right' in the act of creation
Re:Get our minds right first and last. (Score:2)
Re:Get our minds right first and last. (Score:3, Interesting)
> It prevents you from sharing data which you don't have the authority to share.
Ok, hardly essential functions of society,
But still very annoying.
- Muggins
Re:Get our minds right first and last. (Score:5, Insightful)
I oppose DRM because I believe in the right to private property (namely my computer). Nothing to do with copyright violation.
Re:Get our minds right first and last. (Score:2)
Re:Get our minds right first and last. (Score:5, Insightful)
No, in such a case, you won't be able to easily share music you create, or a free software program you write to the world unless you get certified by (who? BSA?) whoever for huge amounts of cash to become a "trusted" provider. Or convince your users, if they have an option, to turn off the security setting that Microsoft, anti-virus companies, mainstream press and all others say is wrong to do, will result in worms and viruses, and will no longer be supported by the OEM.
I am not saying this is what will happen. I am saying it depends on what will, and how much monopolies [microsoft.com] and cartels [riaa.org] can get away with.
Good point but... (Score:3)
Re:Good point but... (Score:3, Insightful)
Re:Get our minds right first and last. (Score:2)
I see.
Re:Get our minds right first and last. (Score:2)
I'm regretful that my wording left me open to the response, but I don't feel that it has in any way detracted from the point I made.
Re:Get our minds right first and last. (Score:2)
It doesn't prevent it, but most proposed implementations would sure as hell hinder it! The user will not be able to play a "free" song unless there is something certifying the user's right to play it. That certification isn't going to be free.
Re:Get our minds right first and last. (Score:2)
History doesn't really lead a person to expect that Microsoft would do this, nor does your unrelated assertion that "Microsoft cares only about Microsoft" really support your theory either.
Re:An ode to DRM FUD (Score:5, Insightful)
If it works that way it'll also prevent a DRMd PC from sharing data with those linux servers becoming all so common nowadays. Works both ways.
In the end all depends on who ends up worse off.
Re:An ode to DRM FUD (Score:2, Insightful)
In fact, that's why people are opposed to MS DRM in particular - they dislike losing their property rights, and especially dislike losing them in the name of corporate profit!
Re:An ode to DRM FUD (Score:3, Interesting)
Re:An ode to DRM FUD (Score:2)
Re:An ode to DRM FUD (Score:2, Insightful)
Of course untill the **AA's use there bought congress critters to pass a law stating that anyone who uses a DRM free machine is violating the law.
Not really (Score:5, Interesting)
Think about it, the fact that you can see the source code to Linux doesn't mean that a regular user has any greater ability to gain root. That's exactly how these new DRM systems work, by taking a way a user's right to be root on their own machine.
Flash your own Tiano BIOS, and on DRM certified mobo's it simply won't run unless its signed by Microsoft or someone.
So this wont help with DRM, but it's still a good thing
Comment removed (Score:5, Insightful)
Re:Not really (Score:2)
Re:Not really (Score:3, Insightful)
Good security is well known. The techniques and procedures studied by thousands of expert math and cypher experts.
Now, the private key does have to remain private... this is the secret _you_ keep. This is a secret that _can_ be kept, with safes and locks and armed guards and attack dogs and mine fields and phospate hand gernades and tanks and air craft.
What DRM is trying to do is have a private key that _you_ do not have. _You_ the owner of the computer and all the bits on it are having a secret kep
Re:Not really (Score:3, Interesting)
Of course, as you mentioned, all they have to do is require that the BIOS is signed to prevent the end user from doing that, which would be unfortunate. This also assumes that the open source part is functionally complete (i.e. not a layer ontop of the layer that drives the hardware, which could be closed source so nothing you made could b
Re:Not really (Score:5, Interesting)
And that's what most people do with their PC. Drive it. Not muck around under the hood and tweak the fuel injectors, or adjust the slope of the ABS initiation.
Re:Not really (Score:5, Insightful)
Ironically, Congress is forcing auto makers to reveal their "precious precious IP" because your average mechanic can't read the chips in your car. Basically auto makers were trying to get you to take your car into the dealer to get an oil change. Congress stepped up and said "that's unfair trade practice".
It's worse than that. (Score:4, Insightful)
Re:Not really (Score:3, Insightful)
Re:Not really (Score:5, Interesting)
Nope.
The entire purpose of the new system is to prevent exactly that. Sure you can change the code, but then the firmware chip (trust chip)then reports a "currupted" boot value. The new trusted software will refuse to install. The new trusted files will be encrypted and unreadable. The new websites will give you error messages and be unviewable.
With Trusted Computing the source code becomes useless. The system defeats the GPL.
But to top it all off, Cisco has announced a line of Network Admission Control routers that will deny you any internet access at all. It is billed as "blocking viruses", but what it really does is refuse you a connection unless you are running a Trusted computer and approved software. If you try to use to source to make any chages the hardware reports a "currupted" boot value. As far as the ISP's router is concered you are either infected with a virus or at least vulnerable to a virus.
All new computers sold computers will start shipping with Trust chips installed by default within a year. After 4 years or so essentially all PC's will have been routinely replaced as obsolete. I figure such routers could be generally deployed by ISPs in approximately 2008.
-
Re:Not really (Score:2)
But the thing is that the way linux prevents a user from being root is by having someone else manually change the password to something that is not in the source code. There is important data being witheld from the user, that will unlock the system. As DRM syst
Re:Not really (Score:5, Informative)
It's the ability to flash the BIOS that will make it happen. At some point, Microsoft will have to trust a piece of hardware. If they trust the software, it's merely a matter of time to find out where the branch is that says "yes this is trustworthy", and change the binary so that branch always takes "trustworthy" choice. Just like if I have access to your GPG binary, I can say that a message I sent you is in fact signed by Microsoft (the element of trust everone forgets is that you have to trust the binary sources, in this case, Microsoft can't, as I can fiddle with them). This is an arms race that Microsoft will always lose, it's just a fact of life.
So they must trust a piece of hardware at some point. That hardware must be untamperable, with no way for me to interject myself between it and the Microsoft hardware. As soon as I can interject myself between Microsoft and that piece of hardware, I've won. If I have access to the BIOS, all I have to do is setup some type of virtualization software (Think VMware). At this point, all I have to do is emulate the piece of hardware, and jigger it to always say: "Trustworthy" (essentially a MITM).
If you don't believe that type of attack is plausible, then remember also, I control the client, at some point, I can attack the PKI system. I have access to the PKI portion. At some point, you must have absolute trust of the PKI system, I have the client, what would it take to beat that system? Does Microsoft keep it's list of keys someplace around (it has to, I can subvert that)? That's like giving me access to the root cert's for your Web Browser. You'll trust my hacker sites if I can insert my key into your list of "trustworthy certs". At some point, if I have access to the boot sequence, I can break the system.
The only way it could be secure is to have the hardware have the list of trustworthy keys and have the hardware never give up control to anything that is considered untrusted.
How does Microsoft check that they are running on such a trusted? At some point, they either have to trust the hardware implicitly (which I can fake), or they have it in software that I can modify. At that point, it's either making an untrustworthy piece of hardware (or emulating one), or fiddling the bits of the software. In the end, DRM is a losing proposition. All DRM systems will be broken.
Microsoft might be able to encrypt the software, and only allow it to be decrypted by modules hardware that has the public key embedded inside. However, somebody will just tear the thing apart, or use an X-ray machine to just extract the public key (which at this point is merely a secret piece of data, not really a public key).
Kirby
Re:Public/Private Keys (Score:3, Informative)
DeCSS works only because there are only a few hundred DVD keys that work on all players.
Imagine if CSS were implemented by:
1. DVD player dials DVD consortium over phone.
2. DVD player supplies mainframe with DVD serial number and DVD player serial number.
3. DVD consortium supplies unlock code for that p
Re:An ode to DRM FUD (Score:3, Insightful)
Err, that just meant that the end user wouldn't be paying directly for the hardware, just indirectly. Someone will still be writing a check to Intel for all of their components. I can't see how Intel would look on that other than favorably. That would actually m
CPL (Score:5, Insightful)
Re:CPL (Score:2)
Re:CPL (Score:2, Interesting)
Re:CPL (Score:3, Interesting)
Re:CPL (Score:3, Informative)
When the Program is made available in source code form:
a) it must be made available under this Agreement; and
b) a copy of this Agreement must be included with each copy of the Program.
And:
A Contributor may choose to distribute the Program in object code form under its own license agreement, provided that:
a) it complies with the terms and conditions of this Agreement; and
b) its license agreement:
iv) states that source code for the Program is available from
Re:CPL (Score:3, Interesting)
In the first passage you cite, it need only be made available under the CPL if released in source code form. So, you could distribute binaries of the code under any license you want. The satement that the new license "complies with the terms and conditions of this Agreement" isn't the same as saying you have to release it under the same license. It just means you can't violate any of the conditions of that license (say,
Credibility for Intel (Score:5, Interesting)
Anyway, the BIG concern for me on the horizon is the upcoming DRM-from-the-bios-to-the-speaker-cone mentality that some unnamed people [microsoft.com] are trying to push. If Intel wants to score major bonus points in my book, opening up the bios (or whatever they feel like calling it) could definately do it.
If I know that I can always depend on my computer to do what I tell it to and not what Intel/Microsoft/Belken tell it to do, I will go that route.
Also, to Intel... I'm buying a new server next month. I had decided on AMD. I'm now considering Intel as an option. Now everyone in the marketing department go tell the engineering department to go impliment this!
Not again... (Score:4, Interesting)
I never had a problem with Intel's processor ID. Every networked computer already has a unique MAC address. What is the difference?
Re:Not again... (Score:5, Informative)
I never had a problem with Intel's processor ID. Every networked computer already has a unique MAC address. What is the difference?
MAC addresses can be changed by swapping out a $15 part and in some cases can be changed in firmware, so they're not an effective tracking/identification tool. Processor IDs are hardcoded and unique. Thankfully, they can also be turned off.
Re:Not again... (Score:2)
ifconfig eth0 hw ether 00:DE:AD:BE:EF:00
might not be totatally right... man ifconfig!
Re:Not again... (Score:2)
Re:Not again... (Score:5, Informative)
So, it wasn't the fact that the computer had a uniquely identifiable number (ip address/mac address/whatever), its the fact that you didn't have control over the use of that number.
I can deny you access to my ip address (I just don't connect to your server/use a proxy). I can also deny you access to my mac address (spoofing/proxies/whatnot). The rebellion people had was they couldn't deny programs access to your PID. Now, there wasn't any particular reason to deny programs access to a PID yet but it isn't too hard to think of a few.
Anyway, enough rambling. It was the removal of choice that set people off. We didn't have a choice to not use the feature - Assuming we stuck with Intel processors.
Re:Not again... (Score:5, Interesting)
Running Linux disabled it (Score:2)
I'm pretty sure that almost immediately after Intel released that "feature", the next Linux kernel was patched to disable it on boot.
On the one occasion I've left it on in my BIOS ( a number of years ago now), in the Linux kernel boot log was a statement that the PID was being disabled.
Re:Not again... (Score:2)
I don't agree with processor IDs, but that was a stupid question to be modded so high.
Re:Not again... (Score:4, Insightful)
Re:Not again... (Score:2)
Also, MAC addresses can (at least theoretically, I may be wrong here) be masked/transformed at the router level (thereby perserving anonymity to the rest of the world/internet).
Re:Credibility for Intel (Score:3, Informative)
Open bios code wont do you any good. (Score:5, Insightful)
Re:Open bios code wont do you any good. (Score:3, Interesting)
With an Open Source OS, I can hack away those file permissions while retaining full compatiblity with the orginal. Nothing difficult about it. The only reason it hasn't been done, is because file permissions are beneficial to the owner of the system.
If there's DRM in the BIOS that isn't beneficial to the owner, he'll get rid of it if he can. He might not be able to do it himself, b
Re:Open bios code wont do you any good. (Score:2)
No you can't.
Every Trust chip comes with a unique key, and half of that key is locked inside the chip. And you can't just make up your own keys because the keys need to be signed by the manufacturer and the manufacturer key must be signed by Trusted Computing Group's root key.
With this system the source code is useless and you effectively no longer own your computer.
-
Re:Credibility for Intel (Score:2, Funny)
I took a couple of them, did that, and after enough miles at high enough speeds, the beans started transferring to the extremities, then pieces invariably went bouncing down the road. As I recall, it took around 100mph.
BTW, I have relatively thick 5-spoke alloys, and 4 of them got either a leg or an arm, and since the weight was mostly centered on on the wheel the vibration was minimal.
Oh
Re:Credibility for Intel (Score:4, Insightful)
It is a trick. They are publishing the source code, but that source code is USELESS.
If I know that I can always depend on my computer to do what I tell it to and not what Intel/Microsoft/Belken tell it to do, I will go that route.
Then you need to make sure NEVER to let this crap touch your computer! This system is EXACTLY designed to make it impossible to control your own computer. If you change so much as a single instruction then the Trust chip generates a different hash value. With a different hash value the Trust chip cannot decrypt anything. Ultimately you may be denied any internet access at all.
I had decided on AMD. I'm now considering Intel as an option.
Unfortunately AMD is on board with this crap as well. So are Motorola, Transmeta, and even ARM. There's really no good-guys to turn to at this point, but if you want to boycott someone then Intel definitely tops the list. AMD is just following along because they will up and die if the next version of Windows refuses to run on an AMD chip.
-
Microsoft Support? (Score:5, Insightful)
I wonder if this is going to be like Microsoft's "support" for Java...
Re:Microsoft Support? (Score:2)
Re:Microsoft Support? (Score:5, Insightful)
No, it's more like Microsoft support for Palladium.
As a matter of fact this *is* Microsoft support for Palladium.
Central elements of the system were designed by Microsoft + Intel + the rest of the Trusted Computing Group. This new "Foundation code" *is* the Palladium replacement for BIOS. It is the Trusted Computing foundation.
-
Wonder how it will affect (Score:5, Interesting)
Either way, kudos to Intel.
OpenBoot? (Score:5, Insightful)
Seems to me like a bad case of "Not Invented Here" syndrome.
Re:OpenBoot? (Score:5, Interesting)
Re:OpenBoot? (Score:5, Insightful)
What's wrong with it? No DRM support (thus, no Microsoft support) and it wasn't invented by Intel. (Thus, no Intel support) It is, however, a far superior system, and yet another reason to get a Mac. (YARTGAM)
Re:OpenBoot? (Score:3, Informative)
Re:OpenBoot? (Score:4, Informative)
Open Boot is not Open Source Have you ever wondered why nobody ports it to lots of things? Or why http://www.openbios.org exists? Simple. Open Boot is a marketing name.
Again, Open Boot is NOT Open Source. It's just a cute name that seems to fool lots of people.
But go ahead, prove me wrong: point to the Open Source site for Open Boot.
Re:OpenBoot? (Score:2, Interesting)
Great! (Score:5, Interesting)
In the future I can see the ultimate "geek" motherboard having a memory-stick or CF card slot for the bios, rather then using chips that aren't often used by consumers. You'd be able to walk down to best buy or Wal-Mart and buy a new bios chip to play around with.
Re:Great! (Score:2, Funny)
Re:Great! (Score:4, Interesting)
Re:Great! (Score:3, Insightful)
Re:Great! (Score:2)
If not possible just +4funny
Mycroft
Re:Great! (Score:2, Informative)
Forget the BIOS patch. Why boot to Linux when you're already booting to BSD [slashdot.org]?
With EFI having a built-in TCPIP stack, you can bet that an EFI based Web server is only a recompile away for some people.
PXEGeek
Sounds good.... but... (Score:5, Insightful)
Like the original intent of cookies and the actuality of spyware use...
One of the best ways, (Score:2, Insightful)
More Info / Linux Power Management (Score:5, Informative)
They mention that proprietary BIOS's is one of the key obstacles to implementing proper power management (ie hibernation) under Linux.
- Neil Wehneman
From the LinuxBIOS mail list earlier today: (Score:5, Interesting)
Ron on the LinuxBIOS list put this best earlier today:
You are not going to get the hardware startup code in Tiano. You're going to get the code that runs on top of the hardware startup code, and gives you a DOS-like startup system.
Don't expect to suddenly see northbridge code on the intel web site. Part of the goal of Tiano/EFI is to make the release of such information unneeded. There is a silver lining. Supposedly, the interfaces from the hidden hardware code to Tiano will be public. This means you can conceivably chuck Tiano and put your own thing in its place, which could be
This is how Linux NetWorx built the Alpha LinuxBIOS:
- hidden hardware
code (Alpha SROM) [ not changed, left in place]
- LinuxBIOS [with Alpha support, minus memory setup code]
- Linux
Worked fine, should work for Tiano platforms. In other words, the binary support code for Tiano could solve some problems for us:
- if we don't get the specs for the Intel chips (likely), then we can just leave the "hidden hardware code" in place, and flash over Tiano,
replacing Tiano with LinuxBIOS. I believe Linux Labs did something like this for their ClearWater port 2 years or so ago.
- Makes porting to other Intel mobos easier.
Why the CPL, not the GPL?
So that 3rd party vendors can add incompatibilities -- err, value --
and charge you for it.
Put another way, Tiano could be a linuxbios payload. I don't have much
use for a Tiano/EFI payload, however. Tiano/EFI is very complex and if
I'm going to put a complex thing like that into flash I'd much rather
it be linux. I don't want something that's most of the work of an OS
but not much of the capability, which pretty much describes Tiano/EFI.
I'm intrigued that they are open sourcing it. I had for years only
heard that it would be available under a type of NDA. I think LinuxBIOS
is part of the push for open sourcing this type of software. But I
doubt you're going to see Phoenix et. al. open source their
'value-added' Tiano, which means a source fork is built into the model.
That's trouble for us as customers -- we already suffer daily with all
these BIOS extensions and undocumented, hidden gotchas. We already say
this once: there was supposed to be a standard "hand off" on IA64 for
startup. I found out that this "standard" handoff was modified by
several vendors: it was no longer standard.
Let's hope the "hidden
hardware code" to Tiano interface remains standard. Also, if this code
is anything like the EFI code, it won't build under Linux, only builds
under Windows. It won't "just work" for us.
All that said, I think Intel is doing a good thing by open sourcing the Tiano system, and I congratulate them on doing so.
Hey, they can't do that! (Score:4, Funny)
OpenFirmware (Score:5, Informative)
One more instance of the proprietary lock-in game.
Re:OpenFirmware (Score:3, Interesting)
Not to mention that it's much cooler. You've got to love how easy it is to tell a Solaris machine to boot from ANYTHING without even an OS on the system! Boot from network? Never have to touch the machine. Boot from USB? A two line command? CDROM? Same! Boot from next years wizzigig? Done.
It's also great for saving a sys
Re:OpenFirmware (Score:2)
Re:OpenFirmware (Score:2)
OpenFirmware rules (Score:5, Interesting)
For those who aren't familiar with Forth: Forth is a very powerful and easy to learn language. It's hardware requirements are very light and it is completely portable. Except for the most fundamental procedures, Forth is written in Forth and is completely modifiable and extensable. Forth programs are written as extensions of Forth itself. Forth is an interpreted language, and can be used from a Forth shell, much like BASIC. However, it is almost as fast as C, and equally powerful. Forth is an ideal language for embedded computer systems.
For those of you that aren't familiar with OpenFirmware: OF is written in Forth and is very powerful because it can be manipulated from the Forth shell. This makes it very straightforward for an intelligent user to modify his BIOS as he sees fit, write BIOS scripts, modify settings, etc. The OF Forth shell gives you all the power of a normal PC BIOS and GRUB and then some. It even has a rudimentary edlin like text editor. Anyway if you own a Mac, look up some info on OF and play around with it a bit, it's pretty freakin cool.
Re:OpenFirmware rules (Score:2)
If you think that's good, you should try Sun's OpenBoot on a SPARC machine some time. Not only does it have the powers you've come to expect from OpenFirmware, but it's got purdy scalable fonts, graphics, and iis far less buggy than Mac's OF. Besides, my Mac makes me squint, and I like pure white instead of off-white.
Re:OpenFirmware rules (Score:3, Interesting)
Great for when your Firmware stuffs up your display!
Not to mention being able to solve towers of Hanoi problems!
Re:OpenFirmware (Score:5, Informative)
That's exactly what I was going to post
The Firmworks stuff with Linux and OF looks particularly neat...
And here's a cool example of things you can do with OF. Two-machine mode boot debugging [apple.com]
Re:OpenFirmware (Score:2)
Unless I am severily mistaken, all POP systems (based on an IBM PowerPC reference design) being distributed by EyeTech and Genesi are also OpenFirmware.
I have some idea that SGIs, including the Intel ones, were also OF, but I am probably wrong on this one as SGI was a member of the ARC.
Once upon a time, IBM released the BIOS source... (Score:5, Interesting)
Not Open Source, but invaluable when we were developing device drivers, TSRs, and other low-level software.
Re:Once upon a time, IBM released the BIOS source. (Score:2, Informative)
Re:Once upon a time, IBM released the BIOS source. (Score:3, Interesting)
You had the source of the program; I'd say it was open source. No, it wasn't GPL licensed (or BSD, or whatever), but it certainly wasn't "closed" either.
Free Programmers? (Score:4, Insightful)
Re:Free Programmers? (Score:2)
Re:Free Programmers? (Score:3, Interesting)
Let us not be too hasty to chastise intel for being smart...
Re:Free Programmers? (Score:2)
More Secure? (Score:5, Insightful)
[sarcasm] Yeah, there were real virus problems w/ BIOS back when it was non-flashable. Those pesky viruses would pop my BIOS chip out and install a new one before I knew it.[/sarcasm]
Extra or additional drivers and code functions can be stored on the hard drive and accessed there.
Seems like this would increase the vulnerability of the BIOS.
Other than this problem and maybe not being able to control some of the OEM preboot (an odd word when you think of it) "features" (DRM, etc.), this doesn't sound too bad of a plan. Sounds like we're on the way to having the OS run off a FLASH disk or some type of firmware. It'd be ironic if, because of advanced DRM technology, we have to go back to the oldest mod trick - yank out the old chip and solder in the new, as was once done to upgrade BIOS.
Nothing to see here, move along (Score:4, Interesting)
It might prove useful now and again to conpare documented behavior to actual, but that is about the extent of it.
You think worms are bad now... (Score:3, Interesting)
Did you notice the part about 'administrative interfaces'? This means your PC will have a remote control interface built right into the BIOS. Now anything that's turned on and connected to the network will be remotely exploitable. Even your Linux box, or your toaster will be worm fodder.