On Wed, Apr 25, 2007 at 01:52:41PM -0500, Robert J. Hansen wrote:
> > USB is a peer to peer protocol; it requires substantial computing
> > power on both ends of the connection.  I'm just waiting for the first
> > virus which targets common USB drives; it would rip through colleges
> > and workplaces like wildfire.
> 
> And then, literally minutes later, this crosses my desk:
> 
> =====
> 
> "Hackers debut malware loaded USB ruse"

...

> ... Moral of the story: be very careful where you go plugging your  
> USB tokens into, recognize they are infection vectors and infection  
> targets, recognize they can be compromised, and act accordingly.

Yes, that's something important to remember about any removable
storage medium.  But the two situations are not equivalent.  Placing a
trojan on a storage volume for someone to choose to run is not at all
the same as breaking into the logic of a device controller to plant
autonomous malware.  What evidence do we have that USB controllers are
reprogrammable once they leave the factory?

-- 
Mark H. Wood, Lead System Programmer   [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.

Attachment: pgpU06SCoFc3Q.pgp
Description: PGP signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to