Linked by Gregory on Sat 26th Feb 2011 16:51 UTC

Thread beginning with comment 464141
To view parent comment, click here.
To read all comments associated with this story, please click here.
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[2]: Comment by darknexus
by Kochise on Sat 26th Feb 2011 19:36
in reply to "RE: Comment by darknexus"
RE[2]: Comment by darknexus
by _txf_ on Sat 26th Feb 2011 20:55
in reply to "RE: Comment by darknexus"
RE[3]: Comment by darknexus
by TheGZeus on Sat 26th Feb 2011 22:05
in reply to "RE[2]: Comment by darknexus"
Um... Yes. That's what's happening.
Is it affecting you in any meaningful way? Well, there's no way to tell, as it has full control over what your OS has access to.
You'd have to monitor that machine with another one, monitor the all packets sent in/out...
Seriously, what's with the sarcasm. So you don't care. Why chime in?
RE[2]: Comment by darknexus
by looncraz on Sun 27th Feb 2011 04:35
in reply to "RE: Comment by darknexus"
The only thing worse than the BIOS is UEFI.
Yeah, I want big-content spyware (DRM et al) running _underneath_ my OS with full access to the network.
Yeah, I want big-content spyware (DRM et al) running _underneath_ my OS with full access to the network.
Here we find some common ground. UEFI scares me. That much power that close to the hardware is a very dangerous consideration.
The more standardized the interface the more simple it is to exploit.
That said, any UEFI implementation that I would care to use would provide me with full unfettered access to the ROM and would provide a hardware-based lock-out ( a jumper ). That way I could have the best of all worlds, an extremely powerful BIOS replacement, and the security of an immutable UEFI configuration.
UEFI also has what appears to be a nice test suite... ;-)
--The loon
Member since:
2010-05-19
The only thing worse than the BIOS is UEFI.
Yeah, I want big-content spyware (DRM et al) running _underneath_ my OS with full access to the network.