Content deleted Content added
m →Mitigation: add |
→Mitigation: add |
||
Line 24:
== Mitigation ==
{{more citations needed|section}}
The researchers claim there is no easy software solution, and may only be mitigated by disabling the Thunderbolt port altogether.<ref name="WRD-20200510" /> However, the impacts of this attack (reading kernel level memory without the machine needing to be powered off) are largely mitigated by anti-intrusion features provided by many business machines.{{cn}} Enabling such features would restrict this attacks effectiveness substantially.{{cn}}
|