http://www.breaknenter.org/2012/02/...cking-macs-through-the-thunderbolt-interface/ There are a few articles about this. Basically TB devices will have unrestricted access to active memory and possibly the other hardware, such as hard drives. Moreover, an attacker, with access to your sleeping computer, can grap passwords out of active memory too, including filevault passwords. There is something called "Intel Virtualization Technology for Directed I/O" or "VT-d" which theoretically prevents this, but it is not present on several (if not all) Macs, and is possibly not supported by OS X (according to 2 articles I read). Microsoft has a specific article on how to disable most of Thunderbolt's capabilities in Win8 specifically to prevent this issue--this fix eliminates the ability to run PCIe expansion chassis as well as Firewire Drive controllers. They also say that it wont work on all systems. Does anyone have any updates on this? One hacker has already used it to grab a filevault password From a Macbook Pro, so this is the real deal.