• lightnsfw@reddthat.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 months ago

    that wouldn’t stop someone from dropping a “media player” on the drive with your logo on it that’s actually malware. People unfamiliar with how it’s supposed to work would plug that in and run it without even thinking about it. I guess you could have the machine format the drive every time it comes back and have it test for counterfeits to prevent that though now that I think about it more.

    • sugar_in_your_tea
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      4 months ago

      I guess you could have the machine format the drive every time it comes back

      Yup, that’s the plan. You turn it in, it reimages it to whatever the next customer is likely to need, and if a customer asks for something out of left-field, it would reflash and take a bit longer.

      Flashing on return is essential because it checks whether the returned item is still in working order, so it really wouldn’t be an issue.

      • cestvrai@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 months ago

        The USB port of the machine is also an attack vector.

        1. Infect the machine and reprogram it to infect every drive being flashed
        2. Hacked media would install Bitcoin miners on the victim’s “smart” TV
        3. ???
        4. Profit
        • sugar_in_your_tea
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          4 months ago

          Eh, I suppose, but they could design the USB drive really hard to infect. The more narrow your use-case, the more options you have to secure it.

          They could even limit it to just HDMI, which would probably be a lot harder to attack since HDMI doesn’t support much besides audio and video.