Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So now you can't even put glue in the thunderbolt port anymore to prevent DMA attacks?

I don't think DMA attacks have been fully solved yet via software, or am I not up to date here? I guess you could blacklist the driver.



If the thunderbolt part (more accurately, the pci-express lanes) could be disabled without losing the USB 3.1 and display port capabilities the port still might be "good enough" for most purposes.

And yeah, we really need device firewalls that isolate everything via IOMMU and don't allow drivers to do any memory mappings until the user confirmed the device.


Just glue over your USB-C ports with tinfoil.


You do realize that this is a very easy to pull off attack? http://www.breaknenter.org/projects/inception/

Do you also think people who use screenlocks are tinfoil hatters?


It's more that your computer should be considered compromised regardless if you allow someone to gain physical access to it. You should know where your device is at all times.

I'm not willing to throw away my device's resale value to block a physical compromise attack.


It's about noise. The physical lock on your door doesn't prevent anyone from breaking in. But you can clearly tell someone broke in and it creates noise.

It's not always practical to take your notebook to the toilet with you, so you want to make it as hard as possible for someone to compromise it in a limited time frame. Security is never absolute, it just about buying time to notice an attack. This applies to the physical lock on your door just as much as it does on your notebook




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: