Hacker News new | past | comments | ask | show | jobs | submit login

I was thinking of malicious code in the BIOS firmware, but I'm sure there are other examples. It's hard for the average user to deal with such things - even the supposedly easy example you gave of comparing a drive's boot sectors to a known list of trusted boot loaders.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: