lurch

joined 11 months ago
[–] [email protected] 14 points 2 weeks ago (4 children)

try entering with all communications turned off (bluetooth, location, wifi, nfc, flight mode on)

do you have wireless charging?

maybe it's anti-theft tag detectors near the door.

[–] [email protected] 15 points 2 weeks ago

it kinda feels like they need more licenses to complete the collection idk

[–] [email protected] 8 points 3 weeks ago (1 children)

15 years at least. probably more like 30. and it will be questionable, because it will use a lot of energy for every query and a lot of resources for cooling

[–] [email protected] 9 points 4 weeks ago

way to set up a footlong joke

[–] [email protected] 2 points 1 month ago (1 children)

BIOS and UEFI bootkits require special vendor tools and vendor signed firmware binaries to overwrite the SPI memory. Standard anti-virus software can not remove them, once they have been installed.

[–] [email protected] 6 points 1 month ago (3 children)

A virus scan will detect it and an OS wipe will clean it.

This only works before the malware has been executed and only if the malware scanner knows it. Often Antivirus can block access to the malware, so it can't be executed.

If it has been executed, the PC needs to be shut down and all writable mediums connected wiped (including boot sectors and EFI), maybe even the BIOS reset, if it can be updated, to be 100% clean. If you can't do this, you have to toss the PC in the trash.

If the PC is not shut down, the malware could still survive in RAM and re-install its files or download something else, eg. a remote shell or rootkit.

These processor security flaws just extend this to the CPU firmware, meaning you need to reset this too, after malware has been executed on the PC. If you just downloaded it and the antivirus blocked and deleted it, you're still safe.

If it got executed and you or a technician can't remove it from the CPU, you have to toss the PC in the trash, just like you already had to if you can't reset a malware that flashed itself into an updatable BIOS, for example.

[–] [email protected] 13 points 1 month ago (7 children)

I doubt it, because those bugs require to already have extensive access to the victim PC. Basically, they just expand the trouble on an already compromised system. It's bad for sure, but at that point you're already knee deep in shit and this just adds a few buckets on top.

view more: ‹ prev next ›