http://www.breaknenter.org/2012/02/...cking-macs-through-the-thunderbolt-interface/
This is a hardware issue - any OS is vulnerable (but Thunderbolt is basically Mac only for now).
Be careful of Thunderbolt and Firewire devices. This is a Firewire hack, but Thunderbolt can work as Firewire. It's probably worse on Thunderbolt, since Thunderbolt is used for monitors. If an attacker can get to your thunderbolt monitor, they can get right into the heart of your computer.
In a nutshell, part of the Firewire spec is that it can access the lower 4 Gig of RAM on your machine. Any bad device can get all your passwords, and there's not much you (or the OS) can do to stop it. OSX has fairly weak password protection too.
Since Thunderbolt daisy chains, you can get attacked by a guy who puts an attack machine on a safe device, like a thunderbolt monitor. There's not many places where you can access public thunderbolt projectors and monitors.
Fortunately, most Thunderbolt drives are from reputable companies, unlike USB drives. But the security implications are still a bit worrying. It's also going to hurt Thunderbolt adoption, because Windows is a bigger target for hackers. Security conscious companies won't buy anything with Thunderbolt on it if it's going to leave them open to very discrete physical hacks. You could attach mobile phone with TB to the CEO's TB monitor, then daisy-chain into her machine. Or attach a TB mobile to a public TB overhead projector inlet, and own anyone who connects.
This is a hardware issue - any OS is vulnerable (but Thunderbolt is basically Mac only for now).
Be careful of Thunderbolt and Firewire devices. This is a Firewire hack, but Thunderbolt can work as Firewire. It's probably worse on Thunderbolt, since Thunderbolt is used for monitors. If an attacker can get to your thunderbolt monitor, they can get right into the heart of your computer.
In a nutshell, part of the Firewire spec is that it can access the lower 4 Gig of RAM on your machine. Any bad device can get all your passwords, and there's not much you (or the OS) can do to stop it. OSX has fairly weak password protection too.
Since Thunderbolt daisy chains, you can get attacked by a guy who puts an attack machine on a safe device, like a thunderbolt monitor. There's not many places where you can access public thunderbolt projectors and monitors.
Fortunately, most Thunderbolt drives are from reputable companies, unlike USB drives. But the security implications are still a bit worrying. It's also going to hurt Thunderbolt adoption, because Windows is a bigger target for hackers. Security conscious companies won't buy anything with Thunderbolt on it if it's going to leave them open to very discrete physical hacks. You could attach mobile phone with TB to the CEO's TB monitor, then daisy-chain into her machine. Or attach a TB mobile to a public TB overhead projector inlet, and own anyone who connects.