vivster said:
Thunderbolt is a protocol, it doesn't need defending. It stands for itself and will be used if deemed necessary. In this particular case you need hardware access and then tamper with the controller to remove all security. The controller isn't part of the protocol and neither are the devices that house the controllers. Thunderbolt is just a tool, the implementation is key. As are higher priority security measures. Did you know that if you have hardware access to RAM you can just execute any code on it? Better get rid of all that dangerous RAM in our systems. |
Well, you make a good point with the RAM analogy. But the type of defending I'm referring to is on a pettier level, more in regards to brand loyalty where if something unsavory happens to their choice of hardware they will try to sugar coat it.







