It is surprising how many people don't understand this article. The firm were being talked about is on the USB device. Normally that firmware is never touched after leaving the factory.so, if the firmware is a problem, patch it.
The same sort of exploit could be generated for TB, PCI Express cards and a number of tether ports.Either that, or everyone stop using usb. Switch to TB.
You would normally assume that the firm ware is good from the factory. At some point modified firm ware would have to be loaded into the device. If the devices firm ware is capable of being updated over USB then that might be rather easy to do. If the device requires more direct programming that could be far more difficult.Either this would have to be physical product purchased *fake* to good genuine, or on existing physical access..
Very few stuff these days rarely used remote access, just you must have control to begin with and or allow access by the OS.
if all that can by by-passed, then beneath the OS ...then, maybe.
Please let this help Thunderbolt adoption.
I'm not sure why you beleuve TB would be more secure. If anything it would be less secure.
unfortunately, but without knowing anything too much in detail, this "virus" will not present itself as a file but rather more gets injected into the core of the system (the i/o layer) and will explicitely be executed "by design". Even worse, it is by design executed in kernel mode. As firmware is basically a driver, the computer must load and execute it before it can even access the device on any useful level other than probing.
So, any computer running a specific type of cpu (addressed by the firmware) can be vulnerable, no matter what operating system.
There is a wide range of possibilities here. For some devices everything including firmware can be reprogrammed over USB.Yea it sounds like in order to do this, you would have to be either a device manufacturer, or somehow able to insert code into the device manufacturer's code copy that they write to each device.
True but you would need to know if that is possible or not for every device you own.If the firmware isn't rewritable, I don't see how even some hacker would be able to take a store bought USB device and put it on there, it wouldn't be able to be written to.
Maybe if you just bought raw parts and had the right equipment to flash your own ROM onto chips. Seems difficult though.
Just use the same kind of restrictions you use personally and not let someone stick something in any of your ports or slots unless you want them to and know they are clean.
Well, does that mean if USB was replaced with Thunderbolt completely, there wouldn't be vulnerabilities, or is it just a matter of time? Does this effect all Operating Systems? Couldn't you just disable your USB device hardware?
I guess maybe I should just watch the presentation![]()
I don't get it: does the "virus" reside on the USB device (such as a flash drive, external HDD or charger) or does it get copied into the computer's USB firmware? So if someone plugs an infected USB device into a computer, does removing the device remove the virus?
Good thing my G5 Mac has FireWire.
This is not 1980 anymore when people used to worry about viruses on floppy disks. If a person has physical access to your computer, it is a failing with the security in your building or home, not the technology.
Just use the same kind of restrictions you use personally and not let someone stick something in any of your ports or slots unless you want them to and know they are clean.
Just use the same kind of restrictions you use personally and not let someone stick something in any of your ports or slots unless you want them to and know they are clean.
Please let this help Thunderbolt adoption.
Unfortunately, but without knowing anything too much in detail, this "virus" will not present itself as a file but rather more gets injected into the core of the system (the I/O layer) and will explicitely be executed "by design". Even worse, it is by design executed in kernel mode. As firmware is basically a driver, the computer MUST load and execute it before it can even access the device on any useful level other than probing.
So, any computer running a specific type of CPU (addressed by the firmware) can be vulnerable, no matter what operating system.
This is not 1980 anymore when people used to worry about viruses on floppy disks. If a person has physical access to your computer, it is a failing with the security in your building or home, not the technology.
Just use the same kind of restrictions you use personally and not let someone stick something in any of your ports or slots unless you want them to and know they are clean.