aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSilvio Rhatto <rhatto@riseup.net>2016-07-07 16:36:33 -0300
committerSilvio Rhatto <rhatto@riseup.net>2016-07-07 16:36:33 -0300
commitbdd9d30341a48ff3dd3a2563bfaa3c9d25a063e5 (patch)
tree0ae5118dc1bbad08f3256d37ed2de76df1df294c
parent420053837f4ab3ccb2300b5f381bec158e5f3b93 (diff)
downloadbootless-bdd9d30341a48ff3dd3a2563bfaa3c9d25a063e5.tar.gz
bootless-bdd9d30341a48ff3dd3a2563bfaa3c9d25a063e5.tar.bz2
Threat Model: BadUSB: cleanup
-rw-r--r--index.mdwn2
1 files changed, 1 insertions, 1 deletions
diff --git a/index.mdwn b/index.mdwn
index 7b0cdc3..5211944 100644
--- a/index.mdwn
+++ b/index.mdwn
@@ -77,7 +77,7 @@ Threat Model
2. Infection is still possible in plenty of unencrypted/unauthenticated software residing in the machine, such as BIOS, network firmware and potential backdoors such as Intel's AMT/ME.
-3. The USB stick itself is not a static device: it's has a built-in processor for wear-levelling that could be exploited to present to your computer a compromised kernel or initramfs ([BadUSB attacks](https://links.fluxo.info/tags/badusb)).
+3. The USB stick itself is not a static device: it's has a built-in controller that could be exploited to present to your computer a compromised kernel or initramfs ([BadUSB attacks](https://links.fluxo.info/tags/badusb)).
### Additional mitigations