All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com
Thank you for purchasing through links and ads on this site.
OWC / MacSales.com...
diglloyd Deal Finder...
Buy other stuff at Amazon.com...
Handpicked deals...
$3698 $2998
SAVE $700

$2397 $1897
SAVE $500

$1199 $898
SAVE $301

$1299 $1169
SAVE $130

$4499 $3999
SAVE $500

$1399 $1099
SAVE $300

$1499 $1299
SAVE $200

$4499 $3149
SAVE $1350

$2299 $1599
SAVE $700

$2498 $2198
SAVE $300

$1799 $1379
SAVE $420

$2998 $2498
SAVE $500

$2199 $1999
SAVE $200

$430 $220
SAVE $210

$3399 $2199
SAVE $1200

$6299 $3599
SAVE $2700

$398 $278
SAVE $120

$1499 $1019
SAVE $480

$1279 $719
SAVE $560

$1699 $1549
SAVE $150

Upgrade the memory of your 2018 Mac mini up to 64GB

Plugging in an Unknown Thunderbolt or USB-C Device is Electronic Unprotected Sex: the “Thunderclap” Vulnerability

I wonder if Apple can even address this issue?

Basically, NEVER plug in a device that is not your own. The “social engineering” required to compromise a computer is surely in use by national security agencies to compromise targets, but it could become fairly common if the risks are not plugged.

Consider the juicy prize of compromising a public library or airport kiosk, etc with a compromised USB-C charger. Dang. NEVER charge at a public charging station with a Thunderbolt 3/USB-C charger suplied there. Bring your own power adapter and use that. (For similar reasons, I never use public WiFi but instead use my own personal WiFi hotspot via USB cable to my phone).

Hope that Chinese parts in your Thunderbolt 3 peripherals are all free of secret hardware compromises (impossible to know of course). With whole Huaweii fiasco, this idea is far from farfetched. I wonder if Thunderbolt 3 product vendors should be doing security audits of the chips they use?

At Thunderclap.io:

Modern computers are vulnerable to malicious peripheral devices

These vulnerabilities allow an attacker with physical access to a Thunderbolt port to compromise a target machine in a matter of seconds, running arbitrary code at the highest privilege level and potentially gaining access to passwords, banking logins, encryption keys, private files, browsing and other data. Attacks exploiting these vulnerabilities can also be carried out by seemingly innocuous peripherals like chargers and projectors that correctly charge or project video but simultaneously compromise the host machine.

...


MacPerformanceGuide.com
View all handpicked deals...

Nikon AF-S NIKKOR 24-70mm f/2.8E ED VR Lens
$2397 $1897
SAVE $500

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2019 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__