• Sarah Valentine (she/her)@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        23
        arrow-down
        1
        ·
        1 day ago

        The hypervisor bypass requires you to give a third-party program the highest level of security access your operating system has. The kind of access you have to reboot your system to grant because it can’t be done while the OS’s security system is currently running. It is extremely inadvisable to do this ever, for any reason, unless you are an educated expert or the system is disposable.

            • otter@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              6 hours ago

              That only works on kids who’ve yet to experience their first bridge jump, frankly. As soon as I found out how to do it properly, that adage was as hollow & out-of-touch as “finish your plate”, “boys’ll be boys”, “do as I say”, et al.

        • limonfiesta@lemmy.world
          link
          fedilink
          English
          arrow-up
          11
          arrow-down
          2
          ·
          edit-2
          1 day ago

          You should read the article.

          Version 3 of the bypass only requires you disable core isolation.

          Still increasing your attack surface, but dramatically less than the earlier method that you’re referencing.