Dodoid's Computing Freedom Table

Shown configurations are the most-free currently attainable on each model and may not reflect that model's configuration as-sold.

Legend:
FreeProprietaryMixed Free and ProprietaryProprietary, but fully disableableProprietary, but partial info/RE work availableUnknownUndefinedNone or N/A - feature/system not present

Lenovo ThinkPad T440

laptop/lenovo/t440 (platform)

Property Description
Manufacturer
Lenovo
Model
ThinkPad T440
Year
2013
Max CPU
Intel Core i7-4600U
Max RAM
12GB
1x8GB DDR3L-1600 SODIMM, optional 4GB soldered RAM
Image
credit to laptopmedia.com (https://i0.wp.com/laptopmedia.com/wp-content/uploads/2018/02/t440_standard_02.jpg)
Software: User-Facing Environment
Free
Software: Operating System
Free
Software: Bootloader/Recovery
Free
Firmware: Persistent Privileged Code (e.g. x86 SMM)
Proprietary
Firmware: Late Boot/Payload
Proprietary (Vendor UEFI)
Firmware: Platform Initialization
Proprietary (Vendor UEFI)
Firmware: Memory Initialization
Proprietary (Intel MRC/FSP)
Firmware: Early Boot (incl. RoT)
Proprietary (Vendor UEFI)
Firmware: Boot ROM
Proprietary (Boot Guard ACM)
The Boot Guard ACM is technically a part of your firmware image. However, when using Boot Guard, the ACM (which is loaded from flash and verified by the ME before the CPU comes out of reset) is the first code to execute on the CPU, rather than the instruction at the reset vector in flash. While it is not stored in mask ROM, due to it being the first code to execute, and due to being supplied by Intel, rather than by your firmware author, it is comparable to the (mask) Boot ROMs found in many non-x86 CPUs.
Firmware Signing
Proprietary (Boot Guard)
CPU Microcode
Proprietary
All current x86 CPUs use proprietary microcode, stored in mask ROM in the CPU itself. Additional updates to this microcode can be temporarily loaded by firmware and/or the OS.
Management Coprocessor: Firmware
Proprietary
On Boot Guard systems, firmware signing prevents modifying the ME firmware even if the ME itself would otherwise permit removing modules.
Communications Coprocessor: Internal Firmware
WLAN proprietary, but card is removable
Communications Coprocessor: Host-Loaded Firmware
Proprietary on all BIOS-allowed cards
Security Coprocessor: Firmware
Proprietary, but use of it is optional (TPM)
Embedded Controller: Firmware
Proprietary
Hardware: Board Electrical Schematic
Proprietary, but often available online
Hardware: Board PCB Design
Proprietary, but boardview often available
Hardware: CPU Instruction Set
Proprietary (x86_64)
Hardware: CPU/SoC Implementation
Proprietary (Intel Haswell)
Hardware: CPU/SoC Synthesis Toolchain
Proprietary

Back to Table

This page uses 5 DCFT templates:


This page was generated at 00:22 UTC, Nov 24 2025, and reflects DCFT's data at that time.
Have a suggestion or correction? Contact @dodoid:dodoid.com on Matrix.

Developed by Dodoid for the 15h.org community. Source