this post was submitted on 10 Aug 2024
1 points (100.0% liked)
Technology
59672 readers
3167 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
That's not how this exploit works at all...you have to have physical access to the machine basically. This is a nothing burger.
That's to get it installed, not if it's already there.
It's not going to be there because if you're compromised via physical access, no one is going to give a shit about this exploit.... it's like someone having the keys to your house and then being worried they're going to smash out a window to gain access.
I don't think you're following along here. The physical access would have already happened prior to the CPU even being in my possession.
I see what you're saying. You're assuming someone grabbed a bunch of cpus, fucked with them, then tossed them back into the box and sold them as new.
Exactly, if I were a bad actor with access to the stock that's what I'd do. I'm sure there are multiple points along the supply chain where it could potentially happen.
That's true, seems like you'd need to know where they're going though, like a ton of work just to hopefully get one machine infected that has anything on it.