← Back to context

Comment by RavSS

14 days ago

That is the general nature of reverse engineering efforts, but this one has been documented enough that you don't need to blindly trust completely random executables or code from strange places.

You can manually recreate the process of building a patch for the embedded controller instead of just following instructions: https://github.com/hamishcoleman/thinkpad-ec. Here's the presentation by the author himself at linux.conf.au (what used to be the biggest local Linux conference for those of us in Australia and NZ): https://www.youtube.com/watch?v=Fzmm87oVQ6c. This is of course not supported by Lenovo.

Unlocking the BIOS is definitely more like what you described. It's the price to pay for freely playing around with processor power limits, getting AES-NI instruction set support, etc. I have not checked since 2019, so there might be a clearer way.