In the world of IT asset disposition and second-hand laptop deals, the Lenovo ThinkPad T470 occupies a golden mean. It’s modern enough to run Windows 11, yet old enough to be a bargain. But there is a ghost that haunts the used ThinkPad market: The Supervisor Password.
And if you see a T470 with a "Password not set" screen? That machine has a story. It has been freed.
Resetting this lock isn't like resetting a CMOS password on a desktop. This is a story of cryptographic hashes, short circuits, and a mysterious "backdoor" that only Lenovo insiders were supposed to know. First, you must understand what you are up against. The T470 uses an Infineon SLB 9665 TT 2.0 Trusted Platform Module (TPM) combined with the Intel Management Engine (ME). Unlike older ThinkPads (T430 and earlier) where you could simply short two pins on an EEPROM chip, the T470 stores the password in a serial flash chip (usually a Winbond 25Q64FVSIG) that is checksummed .
For the average user, the moral is simple:
You find a pristine T470 on eBay for half its market value. The listing reads: “Powers on, no hard drive, slight wear on trackpad.” It arrives, you install an SSD, and hit F1 to enter the BIOS. A grey, unyielding padlock icon stares back. You are not the administrator. The laptop is a paperweight.
If you try to brute force it, the system imposes exponentially increasing lockout timers. If you try to use a logic analyzer to sniff the SPI bus, you realize the data is encrypted with a key unique to the motherboard.