All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com
Thank you for purchasing through links and ads on this site.
OWC / MacSales.com...
diglloyd Deal Finder...
Buy other stuff at Amazon.com...
Upgrade the memory of your 2018 Mac mini up to 64GB
Handpicked deals...
$3397 $2797
SAVE $600

$3397 $2797
SAVE $600

$1499 $1079
SAVE $420

$1499 $1079
SAVE $420

$3297 $2797
SAVE $500

$1999 $1199
SAVE $800

$3399 $2199
SAVE $1200

$400 $300
SAVE $100

$2998 $2498
SAVE $500

$2998 $2498
SAVE $500

Plugging in an Unknown Thunderbolt or USB-C Device is Electronic Unprotected Sex: the “Thunderclap” Vulnerability

I wonder if Apple can even address this issue?

Basically, NEVER plug in a device that is not your own. The “social engineering” required to compromise a computer is surely in use by national security agencies to compromise targets, but it could become fairly common if the risks are not plugged.

Consider the juicy prize of compromising a public library or airport kiosk, etc with a compromised USB-C charger. Dang. NEVER charge at a public charging station with a Thunderbolt 3/USB-C charger suplied there. Bring your own power adapter and use that. (For similar reasons, I never use public WiFi but instead use my own personal WiFi hotspot via USB cable to my phone).

Hope that Chinese parts in your Thunderbolt 3 peripherals are all free of secret hardware compromises (impossible to know of course). With whole Huaweii fiasco, this idea is far from farfetched. I wonder if Thunderbolt 3 product vendors should be doing security audits of the chips they use?

At Thunderclap.io:

Modern computers are vulnerable to malicious peripheral devices

These vulnerabilities allow an attacker with physical access to a Thunderbolt port to compromise a target machine in a matter of seconds, running arbitrary code at the highest privilege level and potentially gaining access to passwords, banking logins, encryption keys, private files, browsing and other data. Attacks exploiting these vulnerabilities can also be carried out by seemingly innocuous peripherals like chargers and projectors that correctly charge or project video but simultaneously compromise the host machine.

...


Save the tax, we pay you back, instantly!
View all handpicked deals...

Nikon Z 7 Mirrorless Digital Camera (Body Only)
$3397 $2797
SAVE $600

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2019 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__