top | item 18294589

(no title)

justifier | 7 years ago

sounds horrifying

can you point to any resources on a few things:

(o) examples of these kinds of malware, either code or writeups

(i) ways of detecting these kinds of malware

(ii) ways of removing these kinds of malware

(iii) ways of preventing these kinds of malware from getting installed

discuss

order

efp|7 years ago

justifier|7 years ago

it looks like all of your links are basically only addressing my initial list item

the first link is about modifying a system's c compiler which the op's tails live usb is infact a solution to

the second is about altering firmware on harddrives, which is an engrossing writeup, thank you, but does fall short of suggesting ways to identify and remedy such an invasion

your third one is about intel's ME which i figured i'd see someone link to

unfortunately, the really interesting listed elements in my original post are the preventative and resolutive elements