Exactly. Thanks for confirming ![]()
That is a matter of psychology. Personally, I suspect that if a user is prompted to check a code, they are more likely to (remember to) do so than if they are not prompted to. But your disagreement with me about this is a minor quibble: if we wanted to settle it, and had the resources to do so, we would try the two variants of the attack on a sufficiently large sample of users to enable a statistically meaningful conclusion to be drawn.
The more important point is that without protection against internal flashing, this sort of remote attack will succeed against some set of users who would otherwise be protected.
Again, thank you for confirming this.
I know. That is the reason for steps (i) and (ii) in my post above.
Thank you. This is good to know.
It is not as strong a protection as a hardware switch, however. A hardware switch “just works”. Heads, on the other hand, is thousands of lines of code. A flaw in Heads could potentially render the ROM capable of being flashed from the OS or from firmware in other devices.
I am well aware that the original developer of Heads is the same as the lead developer of Thunderstrike 1 and 2, and is therefore familiar with that sort of risk and how to mitigate it. Even so, a hardware switch would not be amiss.
“If you open the case, it blows up in your face!” ![]()
Seriously, though: by “local attackers”, do you mean attackers with physical access?
I realise that mitigating against a physically-present attacker who is using a port is possible, per Thunderstrike 1 and 2, via e.g. IOMMU and disabling option ROMs, etc.
I am not sure how to mitigate against an attacker who is using a SOIC clip, other than:
- using obscurely-headed case screws, with tamper-evident seals/varnish over them; and/or
- following Apple’s approach of using a BGA chip instead of a SOIC chip (to increase the difficulty of attaching to its contacts), and choosing a chip that few people know how to read from or write to over hardware.
I am intrigued to see what Purism has in the pipeline.
Seems reasonable.
I still think a hardware write-protect switch is in order on this front.