Quote:
Originally Posted by Bob Olhsson
The example I heard was that somebody could plug in a drive that could compromise an entire network of computers below OS level.
|
Later versions of Thunderstrike could attack via webrowser or email as example and attack devices down the TB chain. That was the biggest risk as the other exploits needed access to the computer. outside of the NSA, were only known to be used in lab testing.
__________________
pro-tools-pc.com
TRASHER Pro Tools Utility(updated 4-11-2024)
HD Native, Avid 16x16, Eleven Rack, Focusrite Clarett 8preX, UA Quad Apollo TB.
Intel I7 9900k
Win 10