Mark Newman wrote on 4/5/19 8:00 PM:
Qubes helps protect from these threats by making it more difficult to
exploit them. Unauthorized code needs to install that rootkit or key
logger on a machine somehow. See
https://www.qubes-os.org/intro/ for an
overview. If an Intel ME exploit needs to run some software on the local
machine, Qubes will make it harder for it to communicate with what it needs.
However, compromise that takes place solely at the hardware level is not
something Qubes can protect from nor claims to. Qubes can't protect from
a network attack directly against Intel ME, for example. Some users
therefore use a non-onboard NIC and are also interested in Coreboot, ME
Cleaner, and/or an older AMD laptop that does not have a management engine.