On Sun, Feb 12, 2017 at 11:02:29PM -0800, Maxim Cournoyer wrote:
     Hi,
     
     Christopher Howard <christop...@alaskasi.com> writes:
     
     > On 02/10/2017 08:31 AM, David Craven wrote:
     >> Hi Maxim
     >> 
     >>> +1. I don't see how having blobs helps security at all.
     >> 
     >> Well the problem I was getting at is that things are not as fixed as
     >> they may seem.
     >> Quoting wikipedia:
     >> 
     >>>> Decreasing cost of reprogrammable devices had almost eliminated the 
market for mask ROM by the year 2000.
     >> 
     >> Translation: ROM is not RO.
     >>
     
     You have a point, although reading the article linked (from Wired), this
     kind of attack requires a lot of effort (to reverse engineer the
     proprietary interfaces used to reprogram the firmware of a HD). At this
     level of seriousness they might as well find other means to get at
     you, such as physically altering one of the device you use without you
     noticing.

If the attacker *is* vendor who supplies the proprietary device then they would
not have to reverse engineer it.
     



-- 
Avoid eavesdropping.  Send strong encrypted email.
PGP Public key ID: 1024D/2DE827B3 
fingerprint = 8797 A26D 0854 2EAB 0285  A290 8A67 719C 2DE8 27B3
See http://sks-keyservers.net or any PGP keyserver for public key.

Attachment: signature.asc
Description: Digital signature

Reply via email to