• sugar_in_your_tea@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    4 months ago

    I guess you could have the machine format the drive every time it comes back

    Yup, that’s the plan. You turn it in, it reimages it to whatever the next customer is likely to need, and if a customer asks for something out of left-field, it would reflash and take a bit longer.

    Flashing on return is essential because it checks whether the returned item is still in working order, so it really wouldn’t be an issue.

    • cestvrai@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      The USB port of the machine is also an attack vector.

      1. Infect the machine and reprogram it to infect every drive being flashed
      2. Hacked media would install Bitcoin miners on the victim’s “smart” TV
      3. ???
      4. Profit
      • sugar_in_your_tea@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        4 months ago

        Eh, I suppose, but they could design the USB drive really hard to infect. The more narrow your use-case, the more options you have to secure it.

        They could even limit it to just HDMI, which would probably be a lot harder to attack since HDMI doesn’t support much besides audio and video.