Reply to post: Re: Not the whole story:

Gone in 70 seconds: Holding Enter key can smash through defense

DanDanDan

Re: Not the whole story:

Quite. This article is severely lacking in several key details.

"With access to the shell, an attacker could then decrypt Linux machines". The implications are that this decryption would be easy. The reality is that you'd have access to a root shell, with an encrypted hard disk. How useful this is depends on the specific environment, but at least for me personally: as long as the "hackers" can't access any of my personal info on my hard drive, this is no worse than them bringing their own laptop and plugging it into the right sockets (with the MAC address of the network card spoofed). If the network is hardened correctly, then it's No Big Deal.

Gaining access to an environment where you can't actually see or do anything is arguably not really useful at all.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon