Hacker News new | past | comments | ask | show | jobs | submit login

nah. i'll take wifi hardware that doesn't have buggy layer 4+ features in firmware that hackers can exploit to turn my keystrokes into udp packets, thank you very much.

in fact, i think i'd prefer a computer that leaves all the layer 4+ up to the operating system as at least it has a chance of being audited.

that said, this raises an interesting point. the only way to really be sure is to sniff your own packets... but if everything moves to being encrypted that's going to get a lot harder...




The RealWoW stuff requires host cooperation to set the proper configuration fields. The card has very basic functionality to be pre-configured to respond to certain packets, but this needs to be set by the host - it is disabled by default and in fact the Linux driver doesn't even support it.

In addition if he could achieve code execution on the card it wouldn't matter whether the card has this functionality as he could implement it himself if needed.


sorry. regardless of whether or not you can change the firmware binaries to do what you want. i'm really not okay with half-assed remote management junk being baked into the nic of my personal laptop that bypasses any firewalls i can configure and is constructed from code i cannot review.

that is exactly the kind of crap that gets exploited.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: