this is a physical access attack. if they already have physical access they can do a million other things too. this is kind of not important to be fair.
There is a remote vector as well beyond just physical access.
There are several ways to exploit LogoFAIL. Remote attacks work by first exploiting an unpatched vulnerability in a browser, media player, or other app and using the administrative control gained to replace the legitimate logo image processed early in the boot process with an identical-looking one that exploits a parser flaw. The other way is to gain brief access to a vulnerable device while it’s unlocked and replace the legitimate image file with a malicious one.
Why does physical access matter so much if shit is properly encrypted and not live (fully shut down)? What is this sorcery that a shut-down encrypted device with tamper-mitigations can’t resist?
this is a physical access attack. if they already have physical access they can do a million other things too. this is kind of not important to be fair.
There is a remote vector as well beyond just physical access.
Why does physical access matter so much if shit is properly encrypted and not live (fully shut down)? What is this sorcery that a shut-down encrypted device with tamper-mitigations can’t resist?