Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You can short circuit all that shit by merely compromising the device.


trusted execution is also a thing, just largely unused/underutilized. in my opinion hardware/software platforms can be designed such that the only real exploit would be for someone to insert an attack vector into the hardware (IC) itself, which is nation-state level work. again, possible but not used in practice because of the perceived risk-reward tradeoff at the moment.


Yea until the next Vault7 leaks and the "state level work" is accessible to all.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: