The Instigator
Pro (for)
The Contender
Con (against)

Laptop can be hacked even when it's off

Do you like this debate?NoYes+0
Add this debate to Google Add this debate to Delicious Add this debate to FaceBook Add this debate to Digg  
Debate Round Forfeited
DrCovert has forfeited round #2.
Our system has not yet updated this debate. Please check back in a few minutes for more options.
Time Remaining
Voting Style: Open Point System: 7 Point
Started: 3/30/2017 Category: Technology
Updated: 4 years ago Status: Debating Period
Viewed: 668 times Debate No: 101556
Debate Rounds (5)
Comments (2)
Votes (0)




Picture this scenario. You think your home network is secure because you use common sense, use strong router password, updated Antivirus and firewall, then all the sudden you get attacked. You try to figure out how the hacker broke into your network. 6 months later you discovered that a laptop that you completely forgot about, which was burried in the closet was filled with malware. You are completly stunned because the last time u remembered wiping the Hard drive several years ago, you of course have no way to explain this


Clearly you have no idea what you are talking about...

A. If a computer is powered off, not plugged into a power outlet and sitting in a closet it is impossible for anyone to hack it.
B. If you wiped the hard drive properly the only way any malicious software could remain is if it was written and hidden in the system BIOS or memory. Unless you were doing some really illegal things online there's not much of a chance that anyone would go that far to spy on you or attempt to gain access to your computer in any way.
C. Stay in school...
Debate Round No. 1


I will start this debate by talking about Intel's backdoor known as anti theft technology. Basically, all Intel vPro CPUs (which include new mobile Core i5 and Core i7 chips) have an undocumented 3G chip inside. That chip is visible to the 3G network, even when the PC is not powered on. the 3G is part of a second physical processor embedded within the main one. The second CPU has its own embedded operating system and can be woken up at any time because the "phantom" power of the system is always there to draw upon. In other words, the secret 3G chip can act as a backdoor, complete with wake-on-LAN and wake-on-mobile. Which is to say, the computer can be turned on remotely through this undocumented 3G radio.

Intel actually embedded the 3G radio chip in order to enable its Anti Theft 3.0 technology. And since that technology is found on every Core i3/i5/i7 CPU after Sandy Bridge, that means a lot of CPUs, not just new vPro, might have a secret 3G connection nobody knew about until now.

When you turn your PC, phone, laptop, Tablet how can you really be so sure that your device is really off. The device may appear to be turned off, but in reality the smart device is being remotely controlled by a hacker. The CIA infected millions of Samsung Smart TV's with a malware called weeping angle. Weeping Angle places the TV in a fake off mode, so the user believes the TV is really off.
This round has not been posted yet.
Debate Round No. 2
This round has not been posted yet.
This round has not been posted yet.
Debate Round No. 3
This round has not been posted yet.
This round has not been posted yet.
Debate Round No. 4
This round has not been posted yet.
This round has not been posted yet.
Debate Round No. 5
2 comments have been posted on this debate. Showing 1 through 2 records.
Posted by RussellMania741 4 years ago
Intels installed a backdoor that makes the laptop visible to the 3g network even if its not connected to the internet. I'm not sure about AMD, but I imagine that they also have anti theft technology included in their CPU.
Posted by DeletedUser 4 years ago
if the laptop isn't connected to the internet, which it probably isn't because its been sitting in a closet. its impossible for malware or your laptop to get hacked.
This debate has 6 more rounds before the voting begins. If you want to receive email updates for this debate, click the Add to My Favorites link at the top of the page.

By using this site, you agree to our Privacy Policy and our Terms of Use.