Hacker News new | past | comments | ask | show | jobs | submit login

They do physically intercept some hardware, so that's one vector:

http://www.theguardian.com/books/2014/may/12/glenn-greenwald...

Alternatively could they use software exploits in an OS to execute arbitrary code and rewrite the firmware?




Why use software exploits? Just use an ordinary privilege escalation and act like the firmware upgrade tool of the manufacturer.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: