joerg | promoted comment (without 12ft cleaner): >> While this article focuses on UEFI, similar attacks are probably feasible against Uboot (many ARM platforms) and iBoot (IOS & M1/M2). They'd be different in detail, but not in concept. We may need to go back in time to putting the lowest-level firmware in ROM to provide a root of trust that can't be compromised after manufacture. The ROM would then boot a signed UEFI to initialize the hardware and OS. << | 21:19 |
---|---|---|
joerg | https://12ft.io/proxy?q=https://arstechnica.com/information-technology/2022/07/researchers-unpack-unkillable-uefi-rootkit-that-survives-os-reinstalls | 21:19 |
joerg | well, at least OMAP has ROMBL that for all I know can't get compromised | 21:20 |
joerg | so coldflashing a pristine NOLO would fix that exploit for N900 | 21:21 |
Generated by irclog2html.py 2.17.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!