Chewy to [email protected] • 1 year agoJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.comexternal-linkmessage-square70fedilinkarrow-up1332arrow-down114cross-posted to: [email protected][email protected][email protected]technology[email protected][email protected][email protected]
arrow-up1318arrow-down1external-linkJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.comChewy to [email protected] • 1 year agomessage-square70fedilinkcross-posted to: [email protected][email protected][email protected]technology[email protected][email protected][email protected]
minus-square@[email protected]linkfedilinkEnglish19•edit-21 year agoThis is worse than many, since it persists across reinstalls and even potentially drive swaps, and fools systems such as secure boot.
minus-square@wmassinghamlink3•1 year agoIf it’s only on the ESP, it won’t persist across reinstalls, and definitely not drive swaps. But I do see mentions of attacking via firmware capsule. If that works, then yes, that will persist.
minus-square@[email protected]linkfedilinkEnglish3•1 year agoESP is usually not cleared on a reinstall unless somebody takes the extra step to do so. Since each OS has its own directory within the ESP their installers don’t push it. I was mostly referring to modification in firmware though.
This is worse than many, since it persists across reinstalls and even potentially drive swaps, and fools systems such as secure boot.
If it’s only on the ESP, it won’t persist across reinstalls, and definitely not drive swaps.
But I do see mentions of attacking via firmware capsule. If that works, then yes, that will persist.
ESP is usually not cleared on a reinstall unless somebody takes the extra step to do so. Since each OS has its own directory within the ESP their installers don’t push it. I was mostly referring to modification in firmware though.