Linked by David Adams on Fri 2nd Mar 2012 16:03 UTC
Privacy, Security, Encryption When was the last time you reverse-engineered all the PCI devices on your motherboard?. . . Enters the game-changer: IOMMU (known as VT-d on Intel). With proper OS/VMM design, this technology can address the very problem of most of the hardware backdoors. A good example of a practical system that allows for that is Xen 3.3, which supports VT-d and allows you to move drivers into a separate, unprivileged driver domain(s). This way each PCI device can be limited to DMA only to the memory region occupied by its own driver.
Permalink for comment 509504
To read all comments associated with this story, please click here.
Member since:

you are right, but to deal with this people can (and do) just dump their bios to a file and use that. but this field is totally new and underdeveloped and underdocumented and undertested, so you have to be a hacker to deal with it. but there it is.

it is wonderful that the software and hardware exist now to run linux, passthrough your graphics card to windows, and play virtualized games at full speed. the bad part is nobody normal is allowed to do it. domain of the nerds and all.

Reply Parent Score: 2