Hacker Newsnew | past | comments | ask | show | jobs | submit | richij's commentslogin

tl;dr: A rogue device plugged into a "trusted" motherboard makes it untrusted.

As the saying goes, "It rather involved being on the other side of this airtight hatchway."

Sigh.


Isn't the point of those trusted environments is that they aren't supposed to be compromised by plugging something into the motherboard? So that you don't have to trust the server hosting company if you trust Intel and can verify that nothing from the hosting side is messing with your software at runtime


something-something I have a bridge to sell you something


/me laughs in legitimate-interest


Steve is in GDPR land, according to his profile page.


Not theft, AFAICS: Creative Commons licensed, with correct attribution given.


And Thunderbird is dead to me


bless you for your correct use of the C-word.


In other words, the threat actors had access to the breached network during the 22-ish months before they were discovered.



Or just read the same publication's web page: https://www.thedrive.com/news/how-an-artist-helped-millions-...


Fun website, but most of these really don't cross the line from "aggressive marketing" into "dark pattern." If the site reps are listening, why not let me browse the worst offenders first?


Aggressive marketing is 100% manipulation and dark patterns. There is no line to cross.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: