Is anyone able to comment on the feasibility of carrying out this procedure to neutralise Intel ME on a Framework laptop?
The immediate concern is whether it can work on Intel 125H at all. It is in the Meteor Lake family, while the tutorial only mentions it works on Sandy Bridge and Ivy Bridge.
On the upside, the procedure leaves the vendor BIOS intact; therefore, cooperation from Framework might not be needed. Still, it would be interesting to know whether Framework themselves are locking the SPI flash; if they don’t, the procedure is slightly simplified, because step 6 would be unnecessary.
One might also ask if this can succeed, considering the fact that Framework are shipping the devices with the Intel Boot Guard functionality turned on; originally, its function was to verify the integrity of the ME backdoor. But despite Boot Guard, it now works to remove ME.
As per this other tutorial, neutralising ME on its own (without BIOS change) does mean “no memory, disk, or network access can take place after the system boots, and no access to the end user’s private data [by ME] can occur”. Like the first tutorial, it mentions that using me_cleaner on standard (i.e vendor) BIOS is possible.
But the security implications of this approach (ME neutralisation, without free BIOS) are not entirely clear to me, so others are encouraged to comment. On one hand, the remote access ME backdoor is removed; however, proprietary BIOS firmware will continue to run. Perhaps without the ME standalone network stack, this could still represent an improvement to some users?
For more context, Framework is licensing their BIOS from InsydeH2O. Note that this implies a collaboration with Intel.