All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com

Thank you for buying via links and ads on this site,
which earn me advertising fees or commissions.
As an Amazon Associate I earn from qualifying purchases.

Other World Computing...
B&H Photo...
Amazon
As an Amazon Associate I earn from qualifying purchases.
Upgrade the memory of your 2020 iMac up to 128GB
877-865-7002
Today’s Deal Zone Items... Handpicked deals...
$4499 $2999
SAVE $1500

$799 $529
SAVE $270

$149 $99
SAVE $click

$2198 $1748
SAVE $450

$130 $100
SAVE $30

$3498 $2998
SAVE $500

$2999 $1699
SAVE $1300

$2397 $2197
SAVE $200

$1697 $1597
SAVE $100

$2998 $2798
SAVE $200

$2198 $1748
SAVE $450

$190 $190
SAVE $click

$580 $580
SAVE $click

$2997 $2997
SAVE $click

$1799 $1599
SAVE $200

$2198 $1898
SAVE $300

Thunderbolt EFI Exploit

As if security weren’t hard enough, attaching a compromised Thunderbolt device can write the flash ROM on the computer. A system reinstall or drive replacement has no effect, since the EFI firmware is modified. You’d have to throw away the Mac—that is if you had any way of discovering the hack. This sort of thing is why high security users do things like glue USB3 ports shut and disconnect wireless and tape over cameras and so on. Certainly never, ever plug in a USB3 stick you find on the street (so to speak). Your good luck may be no accident.

Apple EFI Firmware Security Vulnerabilities

This sort of hardware vector is unnerving, because there are all sorts of waypoints betwen the manufacturing of a device and its delivery. And no conventional way to detect the exploit. MPG has little doubt that the NSA has used such techniques to compromise systems, not that such activities need be confined to spy agencies.

Additionally, other Thunderbolt devices' Option ROMs are writable from code that runs during the early boot and the bootkit could write copies of itself to new Thunderbolt devices. The devices remain functional, which would allow a stealthy bootkit to spread across air-gap security perimeters through shared Thunderbolt devices.

More unnevering is that Apple would store a certificate in writeable flash memory, which can simply be overwritten. And that this bug has been known for two years and that it can be fixed, but has not been fixed.

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2020 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__