- Joined
- Aug 14, 2014
https://www.techpowerup.com/229594/...-lake-based-systems-vulnerable-to-usb-exploit
TLDR: "There are no hardware or software tricks needed for an attacker to exploit this, all that is required is that the DCI interface is enabled. On many systems, DCI is enabled by default."
TLDR: "There are no hardware or software tricks needed for an attacker to exploit this, all that is required is that the DCI interface is enabled. On many systems, DCI is enabled by default."