Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Olog-hai

I think the author meant that they do the monitoring, but are unable to send the information anywhere. I don’t know what use that would be. They could store it in secret files and send it later, perhaps.


14 posted on 02/17/2015 9:19:56 AM PST by proxy_user
[ Post Reply | Private Reply | To 10 | View Replies ]


To: proxy_user; dennisw; PCW

A software application can only talk to the operating system.

System software that talks to devices is called a device driver.

Your OS talks to devices through the drivers.

A hard drive is not just a hard drive - it has a controller. The controller is a computer itself ! It has its own local memory and processor and programs on its chips. It’s the circuit board you often see on one side of a hard drive.

Your operating system device driver talks to the controller, not directly to the hard drive. The controller reads and writes the disk and writes its results back into the memory on the computer motherboard so the device driver can see it.

Obviously, if the hard drive controller has malicious code in it, your operating system is quite limited in mitigating that, since your OS is simply talk to the hard drive controller and accepting what it gets back from it.

Of course, an OS should be designed to make sure that hard drive (and other devices) controllers (which have access to motherboard memory) are limited to only accessing the memory that the OS device driver gives it to work with.

Since malicious hard drive controllers were historically not something people in the real world thought about much (if ever), operating systems probably are not really hardened to defend against malicious devices.

It’s actually quite difficult to do that, actually, as the OS would really want to be able to fully inspect all the memory on the device controller so it could validate both code and data that resides in the device controller’s memory. Of course, the validation software must not be compromised then in order for that to be reliable.


31 posted on 02/17/2015 9:37:14 AM PST by PieterCasparzen (Do we then make void the law through faith? God forbid: yea, we establish the law.)
[ Post Reply | Private Reply | To 14 | View Replies ]

To: proxy_user

As soon as you copy anything to a thumbdrive or maybe even a DVD and put that device into a connected computer...


36 posted on 02/17/2015 10:15:23 AM PST by arthurus (it's true!)
[ Post Reply | Private Reply | To 14 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson