Why Your Laptop Never Really Turns Off (And Who It Actually Serves)
If you think pressing “shut down” gives you peace of mind, you’re not just mistaken — you’re being managed.
Every modern laptop, phone, and even TV carries a second computer you can’t see, can’t remove, and can’t turn off. It runs even when you think the device is off. It decides what code runs, what updates install, and whether your own machine trusts you.
This video is the crash course you were never supposed to get. I’ll walk you through the hidden systems buried inside your devices, why companies like Intel, AMD, Apple, and Google built them, and what that means for your security, your privacy, and your ownership of the hardware you already paid for.
I’ve spent months digging into the research so you don’t have to. And once you see it, you can’t unsee it.
⚠️ Small camera/mic issues in this video — already upgrading gear, fixed from next week onward.
What you’ll learn inside:
• Why “off” never means off — the truth about standby power chips
• Intel Management Engine, AMD PSP, and Apple Secure Enclave explained
• How Secure Boot blocks Linux, dual-booting, and even repairs
• Real hacks that broke “trusted” processors wide open
• Why antiviruses, VPNs, and firewalls can’t protect you here
• The hardware and OS choices that actually give you leverage
• How to fight back with open systems, off switches, and political pressure
This video just scratches the surface. The Cyber Resistance Club is where I drop my deep research, field manuals, and uncensored notes from everything I dig into. Gain instant access to over 20 books
👉 Get instant access here:
https://addie-clark.mykajabi.com/offers/ezpjgaN5/checkoutReferences & Further Reading
* Hidden subsystems in your hardware (Intel ME overview):
https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it* Intel AMT and remote control capabilities:
https://www.intel.com/content/www/us/en/docs/active-management-technology/developer-guide/2021/intel-active-management-technology-11.html* Intel SA-00086 vulnerability advisory:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00086.html* AMD PSP isn’t open-source:
https://hothardware.com/news/amd-confirms-it-will-not-be-opensourcing-epycs-platform-security-processor-code(Also see its summary on Wikipedia:
https://en.wikipedia.org/wiki/AMD_Platform_Security_Processor)* Apple Secure Enclave’s hardware root of trust:
https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/web* TrustZone vulnerabilities (Google Project Zero):
https://googleprojectzero.blogspot.com/2017/07/trust-issues-exploiting-trustzone-tees.html* Microsoft Secure Boot “golden key” leak & implications:
https://www.businessinsider.com/microsofts-golden-key-leak-adds-to-case-against-backdoor-access-2016-8(Also Wired coverage:
https://www.wired.com/story/microsoft-secure-boot-hack/)* Intel ME critical bug patched after years (Wired coverage):
https://www.wired.com/2017/05/hack-brief-intel-fixes-critical-bug-lingered-7-dang-years* Apple T2 chip unpatchable flaw (Wired coverage):
https://www.wired.com/story/apple-t2-chip-unfixable-flaw-jailbreak-mac*
https://www.theverge.com/news/625753/apple-ios-alternative-app-stores-sideloading-brazil*
https://9to5mac.com/2025/05/09/apple-must-implement-sideloading-brazilKeywords: hidden processors in laptops, Intel Management Engine explained, AMD PSP security risks, Apple Secure Enclave hack, Secure Boot Linux blocked, hardware backdoors privacy, why your computer never turns off, digital resistance tools, Qubes OS tutorial, Purism laptop review, right to repair movement, why your phone never turns off
What about you — have you ever hit a wall trying to install your own OS or repair your own hardware? Drop your story in the comments, I want to hear how these hidden systems have boxed you out.
Subscribe if you want more clarity bombs on cybersecurity, autonomy, and the fight for digital freedom. This channel is for people who are tired of being the product and ready to take control. Hit the bell so you never miss the next drop.
TL;DW 👉 Modern devices contain hidden co-processors that were built for security and vendor control, but because they run beneath your operating system, you can’t see, stop, or audit them — which means your computer isn’t fully yours, it’s loyal to the vendor (and sometimes the state).