On 12/09/13 15:55, Jan wrote:
> Do you see any reasonable attack vectors? What do you think?

The moment someone plugs in a mass storage device and we're talking about
attacking his computer, I think of a manipulated file system, exploiting an
error in the file system driver of the kernel (which runs at a nice privilege
level too). I missed that vector in the discussion so far, which focussed on
manipulated files.

The filesystem is also still there with this USB-via-serial-port thingy. And on
the CD.

You can avoid a filesystem by just storing a tar archive on the storage. I don't
think that's very helpful under Windows, but under Linux, using a block device
as tar input/output is easy. Hell, it's what tar was originally made for (tape
devices) :).

That only helps for the filesystem vector, though.

Anybody still using laplink cables? ;)

(I once blew up part of a mainboard with a laplink cable. Was on a different
phase of the mains electricity than the other PC and not grounded. Gave a nice
spark.)

HTH,

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to