From 3d9dee496085e73604c9bd8d8785a5e4997a1f85 Mon Sep 17 00:00:00 2001 From: Francis Rowe Date: Fri, 18 Sep 2015 14:37:16 -0400 Subject: FAQ: fix wrong info --- (limited to 'site/faq') diff --git a/site/faq/index.php b/site/faq/index.php index dada502..19b593e 100644 --- a/site/faq/index.php +++ b/site/faq/index.php @@ -604,7 +604,7 @@

Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown - adversary. Or maybe substitute your GPG keys. AHCI (SATA) drives also will have DMA, which means that they could read + adversary. Or maybe substitute your GPG keys. SATA drives can also have DMA (through the controller), which means that they could read from system memory; the drive can have its own hidden storage, theoretically, where it could read your LUKS keys and store them unencrypted for future retrieval by an adversary.

-- cgit v0.9.1