From 3d9dee496085e73604c9bd8d8785a5e4997a1f85 Mon Sep 17 00:00:00 2001
From: Francis Rowe
Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown - adversary. Or maybe substitute your GPG keys. AHCI (SATA) drives also will have DMA, which means that they could read + adversary. Or maybe substitute your GPG keys. SATA drives can also have DMA (through the controller), which means that they could read from system memory; the drive can have its own hidden storage, theoretically, where it could read your LUKS keys and store them unencrypted for future retrieval by an adversary.
-- cgit v0.9.1