On 19/09/13 09:34 AM, James Morris wrote: > > Same again, if we can extract keys we detect it.
"Ivy Bridge" allows network administration of machines independently from the OS. > The article fails to acknowledge the possibility of software detection > in order fear monger. As well as simulating attacks, unit testing would > be another possibility. I just don't think this is as undetectable as > the article tries to make out. http://en.wikipedia.org/wiki/Unit_testing > > But I don't really know. Forewarned is forearmed, certainly, but the software runs on the hardware and the hardware can tell the software whatever it likes. In consumer space it's easier just to compromise the proprietary software that the user's hardware runs. ;-) _______________________________________________ NetBehaviour mailing list NetBehaviour@netbehaviour.org http://www.netbehaviour.org/mailman/listinfo/netbehaviour