not 100% wiped
i don’t think so, it won’t boot at all
Please keep the comments in context for us beginners.
Uh, First explanation is; Evil Maid is where one leaves ones computer alone, like in a motel room. A person, perhaps impersonating a maid, slips into your motel room, modifies either the Firmware, or some part of the OS to be able to spy on the Person.
Corporate Intel installs into their CPU a means to without my consent or knowledge change the basic firmware of the CPU, which would allow them other means to alter my computer to allow for them to spy on me. Intel Management Engine has this bit of Intel created Malware in it. However, to use the computer one needs other parts of the Intel Management Engine to run the computer. At one time it was known how to delete the malware part, and the Computer would run for thirty minutes and stop.
Now it is known how to install a version that keeps running. The more complete means of getting rid of the potential of an Evil Maid sneak attack and verify the basic Firmware of the computer and OS has not been tampered with is install the complete package of the latest Core Boot/Heads while using a specialized encrypted USB key like (Librem Key, Nitro Key).
The big thing to notice in this conversation is that the process of using an AEM (Anti Evil Maid) and using Heads do not always play well together.
Before installing on or the other, Be Aware of where the eventual end of what one wants to accomplish before installing one or the other.
The implied Questions. While we talk of the Intel Management Engine (IME) it is believed that AMD (the other big Processor Company) also has a means to change its basic CPU Code without the user knowing.
If one’s enemy is not a government, or a big power organization, then perhaps one does not need to worry about the IME being changed. There is no record of a changed IME “in the wild,” or has ever been seen implemented. Changing someones OS is more likely.
The government created a laptop that was meant to allow their workers to log on through a pre-set VPN. They allowed Hackers to test the computer, which they broke into in the first try in less than an hour.
I suspect that using Heads/ with encrypted Key is the more complete, difficult to be broken.
Sorry if I included information already stated or well known to the reader.