Because if I understood it right, it will be presented at DEFCON tomorrow, this news are just hyping it.
We don’t know what is the install vector, it might be a non issue (for regular people) where you need a custom chip programmer and hands on the hardware
After reading that whole article I feel no more enlightened.
They mentioned secure boot, is secure boot part of the exploit or does the exploit invalidate secure boot?
Because if I understood it right, it will be presented at DEFCON tomorrow, this news are just hyping it.
We don’t know what is the install vector, it might be a non issue (for regular people) where you need a custom chip programmer and hands on the hardware
The wired article mentions kernel access to be sufficient.