(no title)
defparam | 2 years ago
In any regard, a lot of threat models (including mine) consider installing hardware (especially an FPGA) as a trusted action.
defparam | 2 years ago
In any regard, a lot of threat models (including mine) consider installing hardware (especially an FPGA) as a trusted action.
Lramseyer|2 years ago
opello|2 years ago
Otherwise if it's configfs you're root on the system and unless it's integrated peripherals you plan to attack you probably have finer grained hardware context to imply physical access... which seems to minimize the farther reaching, generalizable concerns?
LargoLasskhyfv|2 years ago