- Jun 12, 2012
That's what I was talking about the minute when these were made public. But it's drowned out by all the noise. The attacks must be precise and specific. Having access to ALL MEMORY is not an advantage it's a disadvantage this way. Either the attacker has to send a ton of data back home, or they have to sift trough the data on the attacked computer, both should be detectable.From memory. Bandwidth is pretty low on these attacks, so it could take forever for them to find what they are looking for to begin with. That might improve over time though. Just too man unknowns right now to be absolutely sure.