You can login if you already have an account or register by clicking the button below.
Registering is free and all you need is a username and password. We never ask you for your e-mail.
[–]diodine0 points
1 point
1 point
(+1|-0)
ago
(edited ago)
It would require a targeted attack.
Lets say NSA is targeting you, they want to backdoor your machine. So, they decide to implant a false I2C EEPROM. This requires 2 signal lines: SCL (clock) and SDA (data). Only the master can make requests to the chip, not the other way around. In this case, they CANNOT make requests that can somehow reach the NIC, let alone any other component on the motherboard. In this case they'd have to modify the entire motherboard to access the network from a storage component.
view the rest of the comments →
[–] diodine ago
Storing data in one of the many ICs is not the same as transmitting the data without the person knowing, thus, is totally irrelevant to this thread.
[–] [deleted] ago
[–] diodine 0 points 1 point 1 point (+1|-0) ago (edited ago)
It would require a targeted attack.
Lets say NSA is targeting you, they want to backdoor your machine. So, they decide to implant a false I2C EEPROM. This requires 2 signal lines: SCL (clock) and SDA (data). Only the master can make requests to the chip, not the other way around. In this case, they CANNOT make requests that can somehow reach the NIC, let alone any other component on the motherboard. In this case they'd have to modify the entire motherboard to access the network from a storage component.
If anything, you should be worried about the fact that you can get microprocessors with RF built into them that are smaller than a single dickhair, not the 8k EEPROM holding your BIOS.
EDIT: RF not WiFi