On 19/09/13 09:34 AM, James Morris wrote:
> 
> Same again, if we can extract keys we detect it.

"Ivy Bridge" allows network administration of machines independently
from the OS.

> The article fails to acknowledge the possibility of software detection
> in order fear monger. As well as simulating attacks, unit testing would
> be another possibility. I just don't think this is as undetectable as
> the article tries to make out.  http://en.wikipedia.org/wiki/Unit_testing
> 
> But I don't really know.

Forewarned is forearmed, certainly, but the software runs on the
hardware and the hardware can tell the software whatever it likes.

In consumer space it's easier just to compromise the proprietary
software that the user's hardware runs. ;-)

_______________________________________________
NetBehaviour mailing list
NetBehaviour@netbehaviour.org
http://www.netbehaviour.org/mailman/listinfo/netbehaviour

Reply via email to