• @DoomBot5@lemmy.world
    link
    fedilink
    English
    -210 months ago

    That’s great and all, but he owned that hardware. You’re not developing hardware exploits on a target’s hardware, you do it on a copy of the target’s hardware.

    That’s like claiming the NSA spent months breaking into your phone. In reality, they spent months developing exploits on the iPhones they bought and minutes breaking into your phone once they have it.

    • @thantik@lemmy.world
      link
      fedilink
      English
      2
      edit-2
      10 months ago

      And that says nothing about the fact that this hardware is old. The problem has already been fixed in modern hardware, where the TPM is internal to the CPU and doesn’t have external access points like this. So…the problem has already been fixed as well. That’s why I’m calling it such a silly, overhyped article. It’s great clickbait, but it has very little basis in the real world as of today.

      • @DoomBot5@lemmy.world
        link
        fedilink
        English
        -110 months ago

        Whoops, looks like you relocated the goalposts somewhere else. Might want to move them back to where they were.

        • @thantik@lemmy.world
          link
          fedilink
          English
          0
          edit-2
          10 months ago

          The goalpost was “This is a sensationalist headline that doesn’t tell the whole truth”…sorry you missed it, it’s pretty big. I tried to hit on every bit of bullshit, but you seem to have misconstrued that as the actual point, instead of just a portion of the argument.

          • @DoomBot5@lemmy.world
            link
            fedilink
            English
            0
            edit-2
            10 months ago

            You went on your triad of how you incorrectly attributed hacking time while nobody else thought that way, then shifted the goal posts once proven wrong.