Follow

@hackaday@botsin.space
>>Simply reflashing a program to an affected chip won’t flush out the trojan. The chip instead must have its bootloader specifically rewritten a clean version to remove the offending code.
<<If there _is_ a clean version. There's always the possibility that upstream is poisoned.

>>It’s not a super dangerous hack, overall. Typically, flashing a malicious bootloader would require physical access to the chip.
<<You dont have to have physical access yourself- just trick someone else into doing it.

>>Furthermore, there’s not heaps to be gained by sneaking code onto the average 3D printer out there.
<<Uh... IoT? Netowork printer? USB/Ethernet local connections? What about all the peeps 3d printing gun parts or dildos? Or the innocent people printing dildo guns?

ಠ_ಠ @shibao

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.