All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com
Thank you for purchasing through links and ads on this site.
OWC / MacSales.com...
diglloyd Deal Finder...
Buy other stuff at Amazon.com...
Memory Upgrades for 2019 Mac Pro - Save Up to 65% vs Factory Costs
Handpicked deals...
$50 $25
SAVE $25

$7 $7
SAVE $0

$1480 $1230
SAVE $250

$3999 $2499
SAVE $1500

$1498 $1098
SAVE $400

$2897 $1797
SAVE $1100

$399 $349
SAVE $50

$899 $699
SAVE $200

$3297 $1897
SAVE $1400

$749 $499
SAVE $250

$799 $567
SAVE $232

$870 $749
SAVE $121

$3499 $2199
SAVE $1300

$3599 $2299
SAVE $1300

$4499 $2650
SAVE $1849

$748 $598
SAVE $150

$899 $699
SAVE $200

$799 $729
SAVE $70

$3599 $2299
SAVE $1300

$3499 $2199
SAVE $1300

$4499 $2650
SAVE $1849

$1997 $897
SAVE $1100

$3099 $2499
SAVE $600

$2799 $2199
SAVE $600

$4999 $4599
SAVE $400

$4499 $2650
SAVE $1849

Save Big $$$$ on Memory for 2019 Mac Pro

Up to 65% better pricing than Apple

Lloyd recommends 32GB RDIMM modules for most users (more expensive LRDIMMS are for 512GB or more).


Thunderbolt EFI Exploit

As if security weren’t hard enough, attaching a compromised Thunderbolt device can write the flash ROM on the computer. A system reinstall or drive replacement has no effect, since the EFI firmware is modified. You’d have to throw away the Mac—that is if you had any way of discovering the hack. This sort of thing is why high security users do things like glue USB3 ports shut and disconnect wireless and tape over cameras and so on. Certainly never, ever plug in a USB3 stick you find on the street (so to speak). Your good luck may be no accident.

Apple EFI Firmware Security Vulnerabilities

This sort of hardware vector is unnerving, because there are all sorts of waypoints betwen the manufacturing of a device and its delivery. And no conventional way to detect the exploit. MPG has little doubt that the NSA has used such techniques to compromise systems, not that such activities need be confined to spy agencies.

Additionally, other Thunderbolt devices' Option ROMs are writable from code that runs during the early boot and the bootkit could write copies of itself to new Thunderbolt devices. The devices remain functional, which would allow a stealthy bootkit to spread across air-gap security perimeters through shared Thunderbolt devices.

More unnevering is that Apple would store a certificate in writeable flash memory, which can simply be overwritten. And that this bug has been known for two years and that it can be fixed, but has not been fixed.

New Mac Pro?

Or iMac 5K or iMac Pro?
Consult with Lloyd ASAP before buying!


System configuration for CPU, GPU, memory, SSD, backup, RAID, optimizing performance, workflow.
For YOUR optimal workflow

Avoid costly mistakes in throwing money at the problem for less performance and/or buying the wrong machine for your own needs!

Remote screen sharing available for RAID, software configuration, etc.

More about 2019 Mac Pro vs iMac 5K vs iMac Pro...


Save the tax, we pay you back, instantly!
View all handpicked deals...

Pelican ProGear 1810 LED Keychain Light (Blue)
$7 $7
SAVE $0

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2019 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__