Thunderspy: Difference between revisions

Content deleted Content added
Line 24:
 
== Mitigation ==
{{more citations needed|section}}
The researchers claim there is no easy software solution, and may only be mitigated by disabling the Thunderbolt port altogether.<ref name="WRD-20200510" /> However, the impacts of this attack (reading kernel level memory without the machine needing to be powered off) are largely mitigated by anti-intrusion features provided by many business machines.{{cn}} Enabling such features would restrict this attacks effectiveness substantially.{{cn}}