Jump to content

Recommended Posts

Με αφορμή την απόφαση της Microsoft να μην βάλει Thunderbolt 3 στο νέο της φορητό SurfaceBook 3 βγήκαν στην επιφάνεια κάποια θέματα και διχογνωμίες σχετικά με την ασφάλεια του Thunderbolt 3, του τρόπου που αλληλεπιδρά με τα Windows και στην πορεία βγήκε ότι αφορά και συστήματα με Linux.

Πρώτα υπήρξε μια διαρροή ότι η επιλογή της Microsoft έγινε για λόγους ασφάλειας.
Η εξήγηση αμφισβητήθηκε ως προς τα κίνητρά της, αν έγινε από ειλικρινές ενδιαφέρον για την ασφάλεια ή για άλλους λόγους.


«In a leaked presentation about the Microsoft Surface Laptop 3, a Microsoft spokesperson explains that Microsoft omitted Thunderbolt 3 out of security concerns. According to him, the port grants direct memory-access, which is a security liability that Microsoft wanted avoid. Security concerns are also the reason why the Surface Laptop 3 lacks upgradable RAM, as someone could freeze the removable RAM stick to read out private data.

Of course, without an official confirmation from Microsoft, this should be taken with a grain of salt.»

Μετά βγήκε στο Wired από έναν ειδικό ασφαλείας πως κάθε υπολογιστής κατασκευασμένος πριν το 2019 μπορεί να βρεθεί σε κίνδυνο από ένα hack που ονόμασε Thunderspy.

«Now a new piece of research from security specialist Björn Ruytenberg has revealed that any Windows or Linux PC made before 2019 is vulnerable to the “evil maid” hack that he is calling “Thunderspy”. It requires gear worth around US$400 but it can bypass the login screen of a sleeping or locked computer and access all the data on its drive -- even if it is encrypted. The exploit won’t work in macOS but will on a Mac running Windows in Boot Camp.»

Η λύση που προτείνεται:
«If you intend to use Thunderbolt connectivity, we strongly recommend to: Connect only your own Thunderbolt peripherals; never lend them to anybody; avoid leaving your system unattended while powered on, even when screenlocked; avoid leaving your Thunderbolt peripherals unattended; ensure appropriate physical security when storing your system and any Thunderbolt devices, including Thunderbolt-powered displays; consider using hibernation (Suspend-to-Disk) or powering off the system completely. Specifically, avoid using sleep mode (Suspend-to-RAM).»

«Wired, in breaking the story, noted that Intel’s new Kernel DMA Protection feature [built following advice of the hack three months ago] needs to be enabled to protect against the attack. However, the response from OEMs varied as to whether is enabled by default on their machines. Even then, Ruytenberg advised that Intel will need to make yet another silicon level fix to completely eliminate the attack.

Intel’s response to Wired reads: "For all systems, we recommend following standard security practices, including the use of only trusted peripherals and preventing unauthorized physical access to computers.»




  • Like 1
Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...

Important Information

By using this site, you agree to our Terms of Use.