diff options
| author | Silvio Rhatto <rhatto@riseup.net> | 2016-07-07 16:36:33 -0300 | 
|---|---|---|
| committer | Silvio Rhatto <rhatto@riseup.net> | 2016-07-07 16:36:33 -0300 | 
| commit | bdd9d30341a48ff3dd3a2563bfaa3c9d25a063e5 (patch) | |
| tree | 0ae5118dc1bbad08f3256d37ed2de76df1df294c | |
| parent | 420053837f4ab3ccb2300b5f381bec158e5f3b93 (diff) | |
| download | bootless-bdd9d30341a48ff3dd3a2563bfaa3c9d25a063e5.tar.gz bootless-bdd9d30341a48ff3dd3a2563bfaa3c9d25a063e5.tar.bz2 | |
Threat Model: BadUSB: cleanup
| -rw-r--r-- | index.mdwn | 2 | 
1 files changed, 1 insertions, 1 deletions
| @@ -77,7 +77,7 @@ Threat Model  2. Infection is still possible in plenty of unencrypted/unauthenticated software residing in the machine, such as BIOS, network firmware and potential backdoors such as Intel's AMT/ME. -3. The USB stick itself is not a static device: it's has a built-in processor for wear-levelling that could be exploited to present to your computer a compromised kernel or initramfs ([BadUSB attacks](https://links.fluxo.info/tags/badusb)). +3. The USB stick itself is not a static device: it's has a built-in controller that could be exploited to present to your computer a compromised kernel or initramfs ([BadUSB attacks](https://links.fluxo.info/tags/badusb)).  ### Additional mitigations | 
