UK spy agency releases malware-blocking gadget for HDMI and DisplayPort cables — SilentGlass blocks malicious traffic traveling between display and computer

UK spy agency releases malware-blocking gadget for HDMI and DisplayPort cables — SilentGlass blocks malicious traffic traveling between display and computer

Jowi Morales is a tech enthusiast with years of experience working in the industry. He\u2019s been writing with several tech publications since 2021, where he\u2019s been interested in tech hardware and consumer electronics. ","collapsible":{"enabled":true,"maxHeight":250,"readMoreText":"Read more","readLessText":"Read less"}}), "https://slice.vanilla.futurecdn.net/13-4-22/js/authorBio.js"); } else { console.error('%c FTE ','background: #9306F9; color: #ffffff','no lazy slice hydration function available'); } Jowi Morales Social Links Navigation Contributing Writer Jowi Morales is a tech enthusiast with years of experience working in the industry. He’s been writing with several tech publications since 2021, where he’s been interested in tech hardware and consumer electronics.

bit_user The article said: “Can anyone genuinely tell me what risk this is addressing or is it a solution in search of a problem?” HDMI and DisplayPort both support upstream data traffic. Based on their description, I'd guess the point of the device is to block that. Otherwise, a compromised monitor could be used in a supply-chain attack on air-gapped systems. It's like plugging in a compromised USB stick, but most people don't see it that way. Reply

chaz_music The security issue is on both directions, as @bit_user commented. I have personally seen some TV's that were behaving badly (compromised?) as well as set-top boxes. So any of the digital video cables/protocols could be an issue (HDMI, Display Port, DVI, Thunderbolt, USB). I think one of the earliest TV/monitor companies to get caught sending screen images back to corporate servers was Vizio. By now, I would expect more to be trying that. The Roku boxes share something with their mother-ship to send you ads base upon what you watched. But I think most of those devices do that now. I would also expect anything attached to a TV/monitor with a CPU could be an attack vector: gaming box, peripheral, display, any HMI device in general, digital based stereo/amp, MP3 player, phone, etc. Does anyone remember the Sony rootkit days ~ circa 2005? That was very profound corporate based hacking, and I stopped buying all Sony products. Reply

Notton I saw this and was confused. I read the article and now I am even more confused. Also, did AI write this article? It was a tofu dreg of words and didn't explain anything meaningful. In fact, the article could have easily been surmised as: "UK spy agency invents something stupid for a problem that doesn't exist, and we have no idea why, or what it actually does." Reply

Penfolduk Firstly, it is a viable risk. But, as the article points out, difficult to exploit. Most hackers would go for lower hanging fruit for their attack vectors. But the more organised ones, mainly State Actors, would have the resouces to exploit it. So, as the article explains, it's meant for ultra-sensitive information uses. A bit like no one thought the air-bricked Iranian uranium centrifuges were vulnerable until Stuxnet showed they were. And all that needed to be blocked was disabling the USB ports… Reply

Tomdee1776 This is similar to the Tempest program back when CRT monitors were in use. Someone could sit outside a building with the appropriate antenna and monitor and reproduce everything that was being displayed on the remote CRT monitor. That's why the NSA building in Maryland had green windows due to all the shielding in the glass. Pretty color too! Cheers Reply

AkroZ I have read the official article and it's even more confusing and seems like a scam / spyware: the product target laptops where someone can plug a monitor and could see by example personal informations. This device address the issue in filtering the signal to not have more than the protocole. If genuine it's most likely just a repeater, you can do the same thing with a cheap sound bar with an hdmi in and out. It will not protect against the attack vectors discussed, it will just avoid an infected laptop and monitor to communicate with something else than hdmi or display port protocol… (if you plug in). Reply

Key considerations

  • Investor positioning can change fast
  • Volatility remains possible near catalysts
  • Macro rates and liquidity can dominate flows

Reference reading

More on this site

Informational only. No financial advice. Do your own research.

Leave a Comment