diff options
author | Silvio Rhatto <rhatto@riseup.net> | 2016-07-07 16:36:33 -0300 |
---|---|---|
committer | Silvio Rhatto <rhatto@riseup.net> | 2016-07-07 16:36:33 -0300 |
commit | bdd9d30341a48ff3dd3a2563bfaa3c9d25a063e5 (patch) | |
tree | 0ae5118dc1bbad08f3256d37ed2de76df1df294c | |
parent | 420053837f4ab3ccb2300b5f381bec158e5f3b93 (diff) | |
download | bootless-bdd9d30341a48ff3dd3a2563bfaa3c9d25a063e5.tar.gz bootless-bdd9d30341a48ff3dd3a2563bfaa3c9d25a063e5.tar.bz2 |
Threat Model: BadUSB: cleanup
-rw-r--r-- | index.mdwn | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -77,7 +77,7 @@ Threat Model 2. Infection is still possible in plenty of unencrypted/unauthenticated software residing in the machine, such as BIOS, network firmware and potential backdoors such as Intel's AMT/ME. -3. The USB stick itself is not a static device: it's has a built-in processor for wear-levelling that could be exploited to present to your computer a compromised kernel or initramfs ([BadUSB attacks](https://links.fluxo.info/tags/badusb)). +3. The USB stick itself is not a static device: it's has a built-in controller that could be exploited to present to your computer a compromised kernel or initramfs ([BadUSB attacks](https://links.fluxo.info/tags/badusb)). ### Additional mitigations |