Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That is true, but disabling firmware update (should) limit the available persistence for the malware.


Limit, but it doesn't remove all avenues of attack. Firmware config needs to be writable at runtime (things like cold boot attack protection require state to persist over power cycles, even if you don't think other firmware config should be modifiable without physical presence), and the code that parses that could still contain vulnerabilities. Making firmware mostly read-only would mitigate certain classes of attack, but not all of them.


Perfect is the enemy of good enough.


I'm responding to "There, fixed all the BIOS and firmware exploits for you". It doesn't actually fix all the potential exploits, and it makes it more difficult to apply the updates that would be required to fix them.


Fair enough. That last bit is a really good point.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: