this post was submitted on 10 Aug 2024
27 points (82.9% liked)

PC Gaming

8520 readers
456 users here now

For PC gaming news and discussion. PCGamingWiki

Rules:

  1. Be Respectful.
  2. No Spam or Porn.
  3. No Advertising.
  4. No Memes.
  5. No Tech Support.
  6. No questions about buying/building computers.
  7. No game suggestions, friend requests, surveys, or begging.
  8. No Let's Plays, streams, highlight reels/montages, random videos or shorts.
  9. No off-topic posts/comments.
  10. Use the original source, no clickbait titles, no duplicates. (Submissions should be from the original source if possible, unless from paywalled or non-english sources. If the title is clickbait or lacks context you may lightly edit the title.)

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] -2 points 3 months ago (1 children)

I know, but this requires a supply chain attack - not a likely thing to happen,

[–] [email protected] 3 points 3 months ago (1 children)

This does not require a supply chain attack, just a user ignorantly clicking yes on a UAC prompt. After which the machine is forever compromised, even after replacing ssds / hdds.

[–] [email protected] 1 points 3 months ago (1 children)

Wouldn't it be fixed by wiping the drives and re flashing the bios ? (Or the opposite order)

[–] [email protected] 2 points 2 months ago

From my understanding it allows malicious code to be installed in protected memory on the CPU itself, so you can't get rid of it once it's there without a lot of extra work