No worries, and no need to apologize, I can be a pedant at times, language matters, preciseness matters, and I know I can be sloppy or unclear in my own language sometimes. I appreciate both the spirit of your comment, and some of the points you made within the context you made them, I just don’t feel they contradict what I intended to communicate.
Risk to security? Privacy? Proof? Threat model? What attacks have been conducted, hypothetical or actual?
I think we are answering overlapping but separate questions. Please reread my earlier comment with a fresh eye, because I feel you may have misinterpreted what I intended to say or are combining it with arguments from others/elsewhere that I haven’t made and don’t intend to make.
Risk to security?
Yes. I don’t believe I’ve encountered anyone who would argue otherwise. (there is lots of room to debate whether it’s a big risk or small risk, acceptable risk or not, or in what contexts it matters (and this ← is where I’d agree with you that interpreting that risk is very context dependent) but I’m unaware of anyone who argues there is no added risk to enabling ME/AMT.
It’s up to each of us to determine whether those risks are valid for our personal threat models, whether they are big or small, acceptable or not, and how we’d like to address known-unknowns and unknown-unknowns. But I think that it is fairly hard to argue there is zero added risk to enabling something that is essentially by design a backdoor of sorts with its own networking capabilities independent from your OS. This is not an argument about its intent, its purpose, whether risk outweighs reward, etc, just simply that the mere existence of such a capability entails risk which should be acknowledged and accounted for.
I think the distance between our points of view stems from how we are interpreting the question. I believe you interpreted the question in practical terms (is ME/AMT a likely practical risk most people should be concerned about whereas I interpreted the question theoretically/logically (does a system with ME/AMT enabled introduce risks that a system without ME/AMT is not vulnerable to). Essentially we are addressing related but different questions, and both questions can be answered differently without any contradiction.
Let’s not treat unknown unknowns as leaning one way or another
I don’t think that I did, but since you brought it up, I do consider unknown-unknowns and known unknowns to be inherent risks. But that is probably a separate conversation.