▲ | moritzwarhier 16 hours ago | ||||||||||||||||||||||||||||||||||
Since some sort of firmware is required, this seems like a "turing tarpit" security exploit from my laymans perspective. There's no standard that I know, that, like "Secure EFI / Boot" (or whatever exact name it is), locks the API of periphery firmware and that would be able to statically verify that said API doesn't allow for unintended exploits. That being said: imagination vs reality: the Turing tarpit has to be higher in the chain than the webcam firmware when flashing new firmware via internal USB was the exploit method. | |||||||||||||||||||||||||||||||||||
▲ | axoltl 15 hours ago | parent [-] | ||||||||||||||||||||||||||||||||||
No firmware is required. Macbooks manufactured since 2014 turn on the LED whenever any power is supplied to the camera sensor, and force the LED to remain on for at least 3 seconds. (Source: I architected the feature) | |||||||||||||||||||||||||||||||||||
|