CompuTrace has been shipped by every major x86 PC OEM for decades, for Windows process injection, <a href="https://en.wikipedia.org/wiki/Absolute_Home_%26_Office" rel="nofollow">https://en.wikipedia.org/wiki/Absolute_Home_%26_Office</a><p><i>> Absolute Home & Office (originally known as CompuTrace, and LoJack for Laptops) is a proprietary laptop theft recovery software (laptop tracking software). The persistent security features are built into the firmware of devices. Absolute Home & Office has services of an investigations and recovery team who partners with law enforcement agencies to return laptops to their owners. Absolute Software licensed the name LoJack from the vehicle recovery service LoJack in 2005.</i><p>There used to be a BIOS option for on/off and "Permanently Disable", but that might have changed in recent versions.<p>HP: <a href="https://support.hpwolf.com/s/article/Absolute-Software-Activation-Assessment" rel="nofollow">https://support.hpwolf.com/s/article/Absolute-Software-Activ...</a><p>Dell: yikes, the 2024 version is a permanent one-way, one-time option for Activate or Disable? Need to check status on eBay device purchases. <a href="https://www.dell.com/community/en/conversations/inspiron/how-to-deactivate-the-computrace-module/65a7ae5add46c478522100dc" rel="nofollow">https://www.dell.com/community/en/conversations/inspiron/how...</a><p>Lenovo: that one time we accidentally enabled it, <a href="https://support.lenovo.com/us/en/solutions/ht105220-unintended-computrace-activation" rel="nofollow">https://support.lenovo.com/us/en/solutions/ht105220-unintend...</a><p>Apple x86 laptops: shipped an Arm microcontroller (T2 Security Enclave) to assert control of interactions between x86 CPU and disk storage, until they could replace the CPU with Apple Silicon.<p>HN ranking history for this thread: <a href="https://hnrankings.info/42277714/" rel="nofollow">https://hnrankings.info/42277714/</a>
I had it in Lenovo X61 Tablet. It was called CompuTrace back then. It was a BIOS module that Windows executes while processing ACPI tables during boot. Now it's probably a UEFI module that does the same.<p>I removed it by 0-ing out the module in a BIOS update image and reinstalling Windows. This method probably doesn't work with UEFI anymore because it invalidates the signature, so yes, it's unremovable.
Is this advertising campaign of theirs new?<p>It seems like an absolutely terrible idea for a campaign "hey everyone - our company has been wildly successful at putting spyware on hundreds of millions of machines and no one even knows our name!"
So who's exploiting this now? Exploits were known back in 2014.<p>Could a manufacturer placing this on a PC be considered material support of terrorism?