Yet another example of "hardware access is root access"
Technology
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
$10.. not really in video. He had a custom PCB made so the pogo pins were on the board, all in one.
Honestly, pretty awesome. Although as noted, this is for older boards without TPM integration in CPU.
It can also be done with a logic analyzer.
Unsurprised. Physical security seems to be a lot tougher for the industry to “nail”
Just look at this UEFI boot fail vuln/exploit. Crazy.
It should be noted that this attack was demonstrated on a nearly 10 year old laptop that has the TPM traces exposed on the motherboard.
Most TPMs nowadays are built into the CPU which does not leave them vulnerable to this type of attack.
Its definitely sort or misleading but MS needs to really have its feet held to the fire when it comes to these things. It sort of pushes the narrative in the correct direction which is towards privacy AND security, not a half-ass balance where one or the other or both is compromised or is an illusion altogether
The Outlook stuff has demonstrated how fundamentally irresponsible and unserious they are about their obligation to secure and regulate their own systems, they need all the bad press they can get so they are compelled to do betwr