How to Bypass Intel’s ME and AMD’s PSP for a Faster, More Private PC

Hidden Intel ME and AMD PSP processors can be disabled through risky firmware modification or specialized pre-configured systems

Annemarije de Boer Avatar
Annemarije de Boer Avatar

By

Our editorial process is built on human expertise, ensuring that every article is reliable and trustworthy. AI helps us shape our content to be as accurate and engaging as possible.
Learn more about our commitment to integrity in our Code of Ethics.

Image credit: Wikimedia

Key Takeaways

Key Takeaways

  • Intel ME and AMD PSP run hidden operating systems with ring -2 privileges
  • me_cleaner tool disables Intel ME but requires risky motherboard firmware modification
  • AMD PSP removal remains unsolved due to CPU die integration challenges

Your high-end gaming rig runs background processes you never authorized. Every Intel chip since 2006 and modern AMD processors harbor hidden computers—the Management Engine (ME) and Platform Security Processor (PSP)—that operate independently of your main system. These subsystems access your memory, network, and peripherals with “ring -2” privileges that bypass normal security boundaries. The question isn’t whether they slow your system down, but whether you’re willing to risk everything to shut them off.

The Computers Inside Your Computer

These embedded processors run their own operating systems with unprecedented system access.

Think of ME and PSP as permanent house guests with master keys to every room. Intel’s Management Engine runs on a dedicated microcontroller, while AMD’s PSP operates from an ARM core embedded directly on your CPU die. Both can execute code while your main OS is offline, maintain independent network connections, and access system memory without your knowledge.

Vulnerabilities like CVE-2017-5689 (“Silent Bob is Watching”) proved these aren’t theoretical concerns—attackers gained remote control over machines even when powered down but plugged in.

Intel’s Achilles’ Heel

The me_cleaner tool can partially disable Intel’s Management Engine, but hardware modification is required.

Disabling Intel ME requires physical motherboard access and tools like the CH341a programmer to flash modified firmware. The open-source me_cleaner script strips most ME functionality while preserving essential boot code—complete removal would brick your system.

You’ll need to physically clip onto your motherboard’s SPI flash chip, dump the existing firmware, modify it, and write it back. One wrong move permanently kills your hardware. Privacy-focused vendors like Purism and System76 ship pre-neutered systems for those wanting the benefits without the soldering iron anxiety.

AMD’s Fortress

Platform Security Processor removal remains largely unsolved due to its CPU die integration.

AMD’s PSP presents a tougher challenge. Unlike Intel’s separate chip, the PSP lives on the CPU die itself, making hardware modification nearly impossible. No universal tool like me_cleaner exists for AMD processors.

Your best bet involves hunting down community-modified BIOS images in specialized forums or seeking older FX/Bulldozer CPUs that predate PSP implementation. Even coreboot developers struggle with systematic PSP disabling on modern Ryzen platforms.

The performance gains from ME/PSP removal are honestly modest—benchmarks rarely show meaningful differences. Your system won’t suddenly transform into a speed demon. The real benefits are privacy, reduced attack surface, and knowing your machine runs only code you can audit. For most users, the bricking risk outweighs the minimal performance boost. If you’re building a high-security workstation or chasing theoretical latency improvements, the rabbit hole awaits.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →