Hacker News new | past | comments | ask | show | jobs | submit login

Or with a USB key and 18seconds alone with a machine you can undetectably infect it in such a way that a full disk wipe and reinstall doesn't clean it.

More interesting now?




So now it's "someone who has unfettered physical access to the machine can take advantage of that"?

I'm just not impressed in general by hacks which begin with "first you must achieve a complete breach of the target machine's security..."




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: