All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com

Thank you for buying via links and ads on this site,
which earn me advertising fees or commissions.
As an Amazon Associate I earn from qualifying purchases.

Other World Computing...
B&H Photo...
Amazon
As an Amazon Associate I earn from qualifying purchases.
877-865-7002
Today’s Deal Zone Items... Handpicked deals...
$4499 $2999
SAVE $1500

$799 $429
SAVE $370

$149 $99
SAVE $50

$2198 $1798
SAVE $400

$80 $28
SAVE $52

$3498 $2998
SAVE $500

$2999 $1699
SAVE $1300

$2397 $2197
SAVE $200

$1697 $1297
SAVE $400

$2998 $2898
SAVE $100

$2198 $1798
SAVE $400

$190 $161
SAVE $28

$580 $450
SAVE $130

$2997 $2697
SAVE $300

$1799 $1599
SAVE $200

$2198 $1998
SAVE $200

Capacities up to 56TB and speeds up to 1527MB/s
OWC Black Friday

Best Deals of the Year!


Promo code BFCM2021 good thru Nov 30
Check for new deals daily!

Plugging in an Unknown Thunderbolt or USB-C Device is Electronic Unprotected Sex: the “Thunderclap” Vulnerability

I wonder if Apple can even address this issue?

Basically, NEVER plug in a device that is not your own. The “social engineering” required to compromise a computer is surely in use by national security agencies to compromise targets, but it could become fairly common if the risks are not plugged.

Consider the juicy prize of compromising a public library or airport kiosk, etc with a compromised USB-C charger. Dang. NEVER charge at a public charging station with a Thunderbolt 3/USB-C charger suplied there. Bring your own power adapter and use that. (For similar reasons, I never use public WiFi but instead use my own personal WiFi hotspot via USB cable to my phone).

Hope that Chinese parts in your Thunderbolt 3 peripherals are all free of secret hardware compromises (impossible to know of course). With whole Huaweii fiasco, this idea is far from farfetched. I wonder if Thunderbolt 3 product vendors should be doing security audits of the chips they use?

At Thunderclap.io:

Modern computers are vulnerable to malicious peripheral devices

These vulnerabilities allow an attacker with physical access to a Thunderbolt port to compromise a target machine in a matter of seconds, running arbitrary code at the highest privilege level and potentially gaining access to passwords, banking logins, encryption keys, private files, browsing and other data. Attacks exploiting these vulnerabilities can also be carried out by seemingly innocuous peripherals like chargers and projectors that correctly charge or project video but simultaneously compromise the host machine.

...


Save the tax, we pay you back, instantly!

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2020 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__