which is not even close to what this is like.
LOL That's because you were not following the thread and therefore my analogy flew right by you.
For those following, they could easily see (especially since I quoted the comment
) where mine tied back to the previous claim about WinRAR and Chrome flaws. Those are (1) software flaws and (2) in software
NOT made by Intel. Which of course was the point. The Intel processor flaw is
not related to any software flaw, let alone software made by a
different company.
Yet you tried to claim the Intel problem was like "GM" software causing "GM" engines (hardware) to explode. See the difference? Since software, and in particular, Intel software is NOT causing Intel hardware to fail, your analogy makes no sense in this scenario.
And the real thing is, if you're a valuable enough target, anyone with physical access is going to use easier methods to obtain their objectives.
If they can get it, yeah, certainly.
Yeah, like walk out the door with the computer (and hopefully not get noticed). Or sit down at the computer (when nobody is looking) and install a keylogger on the computer and a nearby transmitting device to send those keystrokes out to the bad guy parked, unnoticed, in the back alley.
Again, yes, it is a serious flaw. Can it be exploited? Yes. Easily? Not at all.
Does this analogy better relate:
You have a safe deposit box at your bank. You keep a big wad of cash, jewels and important papers in the box. Like most safe deposit boxes, your box takes two keys to open; one a bank officer has and must use, and the other you keep in your possession. Unbeknownst to you, your lock is broken and any key or even a screwdriver can turn your lock.
Is that a serious flaw? Absolutely.
Can it be exploited? Yes.
How?
Well a badguy has to gain access to the bank itself, without triggering any alarms or showing up on any security cameras,
Then he has to crack open (again without triggering any alarms) and gain entry into the safe where the safe deposit boxes are located,
He has to locate your box among 100s or more boxes (assuming he knows the number on your box),
Then he has to somehow unlock the bank officer's lock on your box,
Then he has to unlock your lock and remove your valuables.
Sound easy? Not to me.
But that's not all.
Because this hacker... err... bank robber doesn't want anyone to know the computer... err... bank as been hacked... err... robbed, he has to close and lock your box, close and lock the safe, exit and lock the bank doors - all without triggering any alarms or being noticed.
Finally, he has to make a clean getaway.
Piece of cake, right?