<div dir="ltr"><br><div class="gmail_extra"><br><br><div class="gmail_quote">On Thu, Apr 24, 2014 at 10:12 AM, Leif Pihl <span dir="ltr"><<a href="mailto:leif@pihl.us" target="_blank">leif@pihl.us</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class=""><br>
On Apr 24, 2014, at 12:06 PM, Devin Heitmueller wrote:<br>
<br>
> On Thu, Apr 24, 2014 at 1:03 PM, Leif Pihl <<a href="mailto:leif@pihl.us">leif@pihl.us</a>> wrote:<br>
>> That sounds too easy.<br>
>> If that was true, then every machine that one could physically get one's hands on would be a security risk.<br>
>> Is there some sort of a "catch" that I don't understand?<br>
><br>
> Correct. Physical access means total access.<br>
<br>
<br>
</div>Ugh!<br>
==Prompt the dramatic movie theme music here.==<br>
<br>
I never knew about that weakness.<br>
<br>
Is there SOME sort of a patch to fix this (or un-fix it, as the case may be) for those machines that are out in the public for anyone to access?<br>
<div class="HOEnZb"><div class="h5"><br></div></div></blockquote><div><br></div><div>I think the patch to fix is physical locks around the machine so you cannot plug a keyboard or USB device into it and psychically access the machine (or lock it in a secure room). But as others have noted, once you have physical access, you can root a machine. <br>
</div></div></div></div>