Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Swordmaker
We have all known for years that physical access to a machine is generally game over.

Greater functionality (like loading code through a port) is always paired with potential security issues. Sounds like Apple is addressing them.

It's an interesting demo, but I wouldn't spend a millisecond worrying about it, as long as the machine isn't being physically attacked.

4 posted on 01/08/2015 7:29:22 PM PST by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: dayglored

This article’s got me wondering about potential USB exploit vulnerabilities on shared computers at, for example, your local library. My local branch kept having its wifi ID changed by the kids until I showed the librarian how to set the router’s admin password to something other than the factory default.


10 posted on 01/08/2015 7:43:36 PM PST by Bob (Violence in islam? That's not a bug; it's a feature.)
[ Post Reply | Private Reply | To 4 | View Replies ]

To: dayglored

You’re right about physical access, but most users don’t think that plugging in that new external hard drive they just bought could be a security risk. Back a few months ago when FTDI was threatening to brick machines using counterfeit USB chips, they were concerned with IP and lost revenue from counterfeiters, but the reality is, if a work-alike device can masquerade as a USB controller, it can do other evil things if someone wanted to. Old-fashioned serial and parallel ports had to be polled but starting with USB and now Thunderbolt, it’s a different ballgame.


17 posted on 01/08/2015 8:31:12 PM PST by bigbob (The best way to get a bad law repealed is to enforce it strictly. Abraham Lincoln)
[ Post Reply | Private Reply | To 4 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson