It’s not only TPM. Older chips are missing some actual security features. AMD not patching their old CPUs of their firmware bug will also become a big problem in the long run.
Comment on Microsoft begins cracking down on people dodging Windows 11's system requirements
MonkderVierte@lemmy.ml 2 months ago
but it seems that the Redmond giant has decided that enough is enough.
Enough of what?
Btw, Rufus patches the iso, works anyway.
Blue_Morpho@lemmy.world 2 months ago
lurch@sh.itjust.works 2 months ago
I doubt it, because those bugs require to already have extensive access to the victim PC. Basically, they just expand the trouble on an already compromised system. It’s bad for sure, but at that point you’re already knee deep in shit and this just adds a few buckets on top.
Blue_Morpho@lemmy.world 2 months ago
The AMD bug requires the same access that any of serious previous exploits have given. You don’t need physical access. Any exploit that gives root means the payload can be the AMD firmware exploit which will make it permanently undetectable by anti virus and wiping the os won’t remove it.
For example the ssh exploit from years ago allowed root without even an account on the machine. Those affected detected they had been owned, wiped their machines and restored from backup. If something like that happens again, (thehackernews.com/…/new-openssh-vulnerability-cou…) you won’t be able to know you are owned.
MonkderVierte@lemmy.ml 2 months ago
Any exploit that gives root
Same in green. If the attacker has physical access or root, you have lost already.
conciselyverbose@sh.itjust.works 2 months ago
Not for Microsoft.
“Sorry, you’re running an unsupported, deliberately hacked version of our OS. We can’t help you.”
Brkdncr@lemmy.world 2 months ago
They aren’t. The article is disingenuous.