Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It has nothing to do with 'trusting them' and everything to do with the threat model because it significantly increases the attack surface area.

Just because I want to grant system access to a relatively simply USB driver doesn't mean I want to grant the same access to a 150MB UI app.



I think the OP's point is that any malicious code residing in the USB driver has access to a much larger attack surface in kernel space than the UI app running in userspace.

If I were attacking the system along this vector, my exploit would sit in the USB driver, not the UI code.


Same. Was wondering when the conversation would get around to this.

You could take advantage of being SYSTEM much earlier along this cycle and still take control of the computer. This is actually a very nasty bug in how arbitrary code can be run at SYSTEM level when inserting a usb device.


This isn't about malicious code in the drivers.

And once malicious code is in kernel space it wouldn't even need access to an attack surface.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: