Buchanan walks through his process of experimenting with low-cost fault-injection attacks as an alternative when typical software bugs aren't available to exploit.

  • chaosCruiser@futurology.today
    ·
    2 months ago

    That is impressive. However, if you have physical access to the RAM, you can probably also just pop in a live USB, chroot into the system and do whatever you want. Regardless, this injection was interesting and impressive. Hats off to a clever hacker like that.

    • BrikoX@lemmy.zip
      hexagon
      M
      ·
      edit-2
      2 months ago

      Yeah, it's wild to me that desktop operating systems don't encrypt storage by default. Both iOS and Android do.

      • CosmicTurtle0@lemmy.dbzer0.com
        ·
        2 months ago

        The threat profile for a desktop is different than a phone.

        You carry your phone with you everywhere.

        Desktops typically stay in one location that likely has locks.

        If you're truly paranoid, you'll encrypt your drive regardless. For regular joes like me, it's not enough for me to enable it and enter a password at boot up.