All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com
Thank you for purchasing through links and ads on this site.
OWC / MacSales.com...
diglloyd Deal Finder...
Buy other stuff at Amazon.com...
877-865-7002
Today’s Deal Zone Items... Handpicked deals...
$849 $489
SAVE $360

$950 $380
SAVE $570

$2799 $2499
SAVE $300

$1499 $899
SAVE $600

$799 $639
SAVE $160

$1180 $1050
SAVE $130

$150 $90
SAVE $60

$2399 $2159
SAVE $240

$1999 $1799
SAVE $200

$1099 $899
SAVE $200

$259 $209
SAVE $50

$1199 $1079
SAVE $120

$599 $199
SAVE $400

$819 $649
SAVE $170

$348 $298
SAVE $50

$2799 $2149
SAVE $650

$750 $450
SAVE $300

$299 $169
SAVE $130

$1099 $899
SAVE $200

$280 $220
SAVE $60

$1299 $1169
SAVE $130

$250 $250
SAVE $0

$998 $498
SAVE $500

Upgrade the memory of your 2019 iMac up to 128GB

Thunderbolt EFI Exploit

As if security weren’t hard enough, attaching a compromised Thunderbolt device can write the flash ROM on the computer. A system reinstall or drive replacement has no effect, since the EFI firmware is modified. You’d have to throw away the Mac—that is if you had any way of discovering the hack. This sort of thing is why high security users do things like glue USB3 ports shut and disconnect wireless and tape over cameras and so on. Certainly never, ever plug in a USB3 stick you find on the street (so to speak). Your good luck may be no accident.

Apple EFI Firmware Security Vulnerabilities

This sort of hardware vector is unnerving, because there are all sorts of waypoints betwen the manufacturing of a device and its delivery. And no conventional way to detect the exploit. MPG has little doubt that the NSA has used such techniques to compromise systems, not that such activities need be confined to spy agencies.

Additionally, other Thunderbolt devices' Option ROMs are writable from code that runs during the early boot and the bootkit could write copies of itself to new Thunderbolt devices. The devices remain functional, which would allow a stealthy bootkit to spread across air-gap security perimeters through shared Thunderbolt devices.

More unnevering is that Apple would store a certificate in writeable flash memory, which can simply be overwritten. And that this bug has been known for two years and that it can be fixed, but has not been fixed.

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2020 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__