Thunderbolt Security Issues

Discussion in 'MacBook Pro' started by PabloGS, Feb 25, 2011.

  1. PabloGS macrumors member

    Joined:
    Oct 29, 2007
    Location:
    Europe
    #1
  2. MacDawg macrumors Core

    MacDawg

    Joined:
    Mar 20, 2004
    Location:
    "Between the Hedges"
    #2
    Methinks a security company has a vested interest in raising security concerns as much as a Norton or MacAfee have in raising virus concerns. As the article states, these issues exist already in other technologies, and nobody has seen TB devices implemented yet.

    It won't be a concern for me, because my Mac won't be hooking up and having unprotected data transfers with others anyway.
     
  3. TEG macrumors 604

    TEG

    Joined:
    Jan 21, 2002
    Location:
    Langley, Washington
    #3
    Write access to the hard drive will still be controlled by the OS, just like on Firewire. DMA simply allows data to be transferred without using CPU cycles. So it may be true you could have access, you likely wouldn't be able to do anything with your access. Also, a hard drive, in your scenario, would require a computer, in which case Thunderbolt defaults to ethernet, as a security precaution.

    TEG
     
  4. GoCubsGo macrumors Nehalem

    GoCubsGo

    Joined:
    Feb 19, 2005
    #4
    ^This.
    I am always well aware of what people are putting in my ports.
     
  5. acedickson macrumors 6502a

    acedickson

    Joined:
    Dec 6, 2004
    Location:
    ATL
    #5
    Tend to agree with you dawg.
     
  6. idea_hamster macrumors 65816

    idea_hamster

    Joined:
    Jul 11, 2003
    Location:
    NYC, or thereabouts
    #6
    There is no system that is robust against an attack when the person has physical access to the machine.

    If you let someone sit down at your desk and plug crap into your ports, they will get all your data. Google Stuxnet and see what's really alive out there.

    The real threats are the network threats, and OSX has enough of those to go around. They're not well circulated, but they do exist.

    Evidently, Apple has circulated a developer copy of Lion 10.7 to a host of security experts who had reported flaws in the past for review and comment -- something that is, IIRC, totally new. So that's good. :)
     
  7. rmitchell248 macrumors 6502

    Joined:
    Mar 30, 2010
    Location:
    Liebsthal, Germany
    #7
    1 Keep in mind that your expressing these security concerns from the Internet biggest chance of info leak in the world lol

    2 if your laptop is out unprotected and un guarded long enough for someone to hook up a tb cable and steal your data then why did you leave it out and why wouldn't hey just snatch the whole computer? Sounds like somebody would need to take better care of their machine?
     
  8. whyzdom macrumors regular

    Joined:
    Jan 31, 2011
    #8
    If this isn't the best Euphemism ever, I don't know what would be.... funny stuff.
     
  9. dime21, Feb 25, 2011
    Last edited: Feb 25, 2011

    dime21 macrumors 6502

    Joined:
    Dec 9, 2010
    #9
    I think you don't understand high performance I/O. Light Peak works in DMA mode. Just like all other high performance interfaces. Any security concerns you might have with Light Peak apply just the same to Firewire, SATA, eSATA, PATA, PCI, PCI Express, and ExpressCard slots.

    USB does not work in DMA mode. It works in PIO mode. Which is one of the reasons why it's so stupid slow, and every single device you plug in requires special drivers to make it work. PIO mode sucks.

    I think you read an article written by Chicken Little.
     
  10. rmitchell248 macrumors 6502

    Joined:
    Mar 30, 2010
    Location:
    Liebsthal, Germany
    #10
    Yeah but now that can steal your stuff way faster than USB ...up to 10gbits/sec.... Well if there were any peripherals out or anything like that :)
     
  11. ChronoIMG macrumors regular

    ChronoIMG

    Joined:
    Sep 11, 2003
    Location:
    San Francisco, CA
    #11
    Never leave your ports uncovered...
     
  12. MartyF81 macrumors 6502

    Joined:
    Sep 5, 2010
    Location:
    Chicago IL
    #12
    Physical Access to the device is the ultimate "Hack". If I have enough time to hook up a TB Drive to your device and "Take" every thing (even at TB Speed)... WITHOUT you even noticing.... then I likely also have enough time to just take your Laptop and walk out with it... or when they put it in Desktops... Open the side and pull the drive out.
     
  13. miles01110 macrumors Core

    miles01110

    Joined:
    Jul 24, 2006
    Location:
    The Ivory Tower (I'm not coming down)
    #13
    Sure there is. Offsite backup and AES-256 works pretty well... assuming that the encrypted information isn't so sensitive that it will matter in the next thousand years or so while the key is brute-forced.
     
  14. Krevnik macrumors 68040

    Krevnik

    Joined:
    Sep 8, 2003
    #14
    Even with whole disk encryption, if you either: A) have to use a password to generate the key, or B) store the key somewhere that can be read before decrypting the disk... you are still vulnerable. With A, you've changed the attack into a password attack. With B, you've changed the attack into a "Where's Waldo" attack. Without a TPM, B is actually a pretty likely scenario.

    EDIT: Even worse is that tech like BitLocker that does use a TPM still can be attacked from the side due to the ability to recover the machine if something happens.
     

Share This Page