Jump to content

Search the Community

Showing results for tags 'thunderbolt'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station


  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions


  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 8 results

  1. Next week, Microsoft has scheduled an online event focused on hardware. Microsoft is expected to launch Surface Pro 8, Surface Book 4, Surface Duo 2 and other devices at this event. Today, The Verge reported that Microsoft may launch at least one Surface Pro 8 model with Thunderbolt support. Due to security reasons, Microsoft never offered Thunderbolt port on any of its Surface devices so far. It would be interesting to see whether Microsoft solved any of the security issues around Thunderbolt in Surface Pro 8. Other new details about the upcoming Surface devices: Surface Pro 8 may feature slightly larger display, thanks to smaller bezels. Surface Pro 8 will be powered by 11th gen Intel Core processors and will have support for removable SSDs like the latest Surface Laptop 4. New Surface Book 4 with all-new design and high-refresh rate display. Surface Go 3 with improved performance, you can read the full specs here. Surface Duo 2 with much improved camera, you can read about it here. Source: The Verge Report: Microsoft may finally bring Thunderbolt port to Surface devices
  2. Next-gen Thunderbolt 5 reportedly leaks, super-fast 80Gbps transfers await us Intel announced Thunderbolt 4 last year and the technology can be found mostly on the company's 11th gen Tiger Lake-based laptops. However, it didn't boost the maximum transfer rate (40Gbps) over what was already available with its preceding Thunderbolt 3 interface. But it looks like next-gen Thunderbolt 5 will be similar to Thunderbolt 3 and will double the throughput up from the current 40 all the way up to 80Gbps, according to a leaked internal presentation slide from Intel. The slide which is showcasing Intel's "80G PHY Technology" was apparently posted on Twitter by the company's Executive VP & GM of the Client Computing Group, Gregory M Bryant, who is on an internal tour of the Intel Israel Lab. The image however was later deleted by Bryant probably after he realized his mistake but fellow media outlet AnandTech was quick to save it. As noted above, Thunderbolt 5 looks to be bringing very high 80Gbps bandwidth still using USB-C, which means the compatibility and adaptability of the next-gen interface should be easy, and according to what the slide says, it will be based on a "novel PAM-3 modulation technology". PAM-3 or three-level Pulse Amplitude Modulation can transfer three bits of data (-1, 0, +1) in two cycles/ unit intervals, exhibiting an efficiency of one and a half (1.5) bits per cycle. This is 50% higher than single-cycled Non-return-to-zero (NRZ) or PAM-2 (two bits: 0 and 1) which is used in current Thunderbolts. However, this still doesn't explain the rest of the gains so there could be more at play here. Apparently, the test chips for the new 80G PHY to be used in Thunderbolt 5 are showing promising initial results and these test chips might be built using TSMC's 6nm FinFET (N6) process but this has not been confirmed yet. Source and image: AnandTech Next-gen Thunderbolt 5 reportedly leaks, super-fast 80Gbps transfers await us
  3. As everybody knows, surface series lacks a powerful GPU I wonder if anybody tried to attach an external GPU via eg.Thunderbolt technology....etc
  4. Microsoft releases an update to fix the Windows 10 blue screen issue involving Thunderbolt docks Some users running Windows 10 version 2004 (Windows 10 May 2020 Update) on their PCs faced blue screen error when plugging or unplugging a Thunderbolt dock. In May, Intel and Microsoft found the incompatibility issues causing this blue screen error. All Windows 10 PCs with at least one Thunderbolt port, Kernel DMA Protection enabled and Windows Hypervisor Platform disabled were affected by this issue. To protect users from blue screen errors, Microsoft stopped the roll-out of Windows 10 Version 2004 to these users. Microsoft has recently released the new KB4565503 update that fixes this Thunderbolt dock blue screen issue. Since the issue is resolved, the safeguard hold has been removed. If you are running a Windows 10 PC with Thunderbolt dock connected, you can now download the Windows 10 version 2004 update (Windows 10 May 2020 Update) through Windows Update. Microsoft releases an update to fix the Windows 10 blue screen issue involving Thunderbolt docks
  5. Microsoft removes Windows 10 May 2020 Update block for Thunderbolt docks Earlier this week was Patch Tuesday, when Microsoft released updates for all supported versions of Windows. One of the fixes was for an issue that caused some PCs to blue screen when plugging in a Thunderbolt dock with Windows 10 version 2004. If you were using a Thunderbolt dock up until this point, you'll have found that there was a block in place preventing you from upgrading to the May 2020 Update. That block is being released now. If you're still unable to upgrade your PC to the latest version of Windows 10, then you should be able to soon. Of course, that's assuming that your PC isn't being blocked for some other reason, and there are many. Microsoft has a whole list of known issues that are causing compatibility holds. That's actually what recently happened with some Surface devices. Microsoft went and fixed an issue for always on, always connected network drivers, and many assumed that all Surface devices would be unblocked. The firm later had to clarify that you'd only be unblocked if you weren't being blocked by something else. Indeed, Windows 10 version 2004 is not without problems. Many PCs are still blocked from upgrading, and many more haven't even been offered the update. This is after the update spent 15 months in Insider testing, with six months of that being serviced with cumulative updates. Microsoft removes Windows 10 May 2020 Update block for Thunderbolt docks
  6. New Windows 10 bug could prevent external devices connected via Thunderbolt dock from being detected Microsoft has confirmed that a new Windows 10 bug could prevent devices connected via Thunderbolt dock from being detected. The bug affects almost all the versions of Windows 10 and is specific to users who have fast startup enabled. The company said that the issue occurs only 5% of the time and can be fixed by simply restarting your computer. Microsoft also shared the steps that could trigger the bug and will disconnect all the external devices even if they are showing up in the Device Manager. On a computer that is running Windows 10, version 1909, 1903, 1809, 1803, or 1709, you enable Fast Startup. On a Thunderbolt Dock, several devices, such as a keyboard, mouse, and USB encryption key, are attached. You repeatedly do the following steps: You connect the Thunderbolt Dock to the computer. Devices on the Thunderbolt Dock are enumerated. You press the power button to put the system into a Soft Off (S5) power state. After the screen turns off, you remove the Thunderbolt Dock. You wait for the S5 process to finish, plug in the Thunderbolt Dock, and then wait five seconds for the Thunderbolt Dock to become idle. You power on the computer. Then, you check whether the mouse, keyboard, and USB key are functional. As mentioned above, the bug triggers only 5% of the time and can be resolved by a simple restart. Unfortunately, re-connecting the dock won’t fix the problem. Seeing as Thunderbolt is still not popular on Windows 10 devices and the fact that Microsoft’s own Surface lineup doesn’t come with Thunderbolt, it’s safe to say that the bug won’t affect a lot of people. Microsoft hasn’t revealed any details about a patch but we expect the company to roll out an update soon. Source: New Windows 10 bug could prevent external devices connected via Thunderbolt dock from being detected (MSPoweruser)
  7. Thunderbolt Flaws Expose Millions of PCs to Hands-On Hacking The so-called Thunderspy attack takes less than five minutes to pull off with physical access to a device, and affects any PC manufactured before 2019. New research shows that Intel's Thunderbolt port is vulnerable to so-called evil maid attacks on all but the most recent PCs.Photograph: Oleksiy Maksymenko Photography/Alamy Security paranoiacs have warned for years that any laptop left alone with a hacker for more than a few minutes should be considered compromised. Now one Dutch researcher has demonstrated how that sort of physical access hacking can be pulled off in an ultra-common component: The Intel Thunderbolt port found in millions of PCs. On Sunday, Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he's calling Thunderspy. On Thunderbolt-enabled Windows or Linux PCs manufactured before 2019, his technique can bypass the login screen of a sleeping or locked computer—and even its hard disk encryption—to gain full access to the computer's data. And while his attack in many cases requires opening a target laptop's case with a screwdriver, it leaves no trace of intrusion, and can be pulled off in just a few minutes. That opens a new avenue to what the security industry calls an "evil maid attack," the threat of any hacker who can get alone time with a computer in, say, a hotel room. Ruytenberg says there's no easy software fix, only disabling the Thunderbolt port altogether. "All the evil maid needs to do is unscrew the backplate, attach a device momentarily, reprogram the firmware, reattach the backplate, and the evil maid gets full access to the laptop," says Ruytenberg, who plans to present his Thunderspy research at the Black Hat security conference this summer—or the virtual conference that may replace it. "All of this can be done in under five minutes." 'Security Level' Zero Security researchers have long been wary of Intel's Thunderbolt interface as a potential security issue. It offers faster speeds of data transfer to external devices in part by allowing more direct access to a computer's memory than other ports, which can lead to security vulnerabilities. A collection of flaws in Thunderbolt components known as Thunderclap revealed by a group of researchers last year, for instance, showed that plugging a malicious device into a computer's Thunderbolt port can quickly bypass all of its security measures. As a remedy, those researchers recommended that users take advantage of a Thunderbolt feature known as "security levels," disallowing access to untrusted devices or even turning off Thunderbolt altogether in the operating system's settings. That would turn the vulnerable port into a mere USB and display port. But Ruytenberg's new technique allows an attacker to bypass even those security settings, altering the firmware of the internal chip responsible for the Thunderbolt port and changing its security settings to allow access to any device. It does so without creating any evidence of that change visible to the computer's operating system. "Intel created a fortress around this," says Tanja Lange, a cryptography professor at the Eindhoven University of Technology and Ruytenberg's advisor on the Thunderspy research. "Björn has gotten through all their barriers." Following last year's Thunderclap research, Intel also created a security mechanism known as Kernel Direct Memory Access Protection, which prevents Ruytenberg's Thunderspy attack. But that Kernel DMA Protection is lacking in all computers made before 2019, and is still not standard today. In fact, many Thunderbolt peripherals made before 2019 are incompatible with Kernel DMA Protection. In their testing, the Eindhoven researchers could find no Dell machines that have the Kernel DMA Protection, including those from 2019 or later, and they were only able to verify that a few HP and Lenovo models from 2019 or later use it. Computers running Apple's MacOS are unaffected. Ruytenberg is also releasing a tool to determine if your computer is vulnerable to the Thunderspy attack, and whether it's possible to enable Kernel DMA Protection on your machine. Return of the Evil Maid Ruytenberg's technique, shown in the video below, requires unscrewing the bottom panel of a laptop to gain access to the Thunderbolt controller, then attaching an SPI programmer device with an SOP8 clip, a piece of hardware designed to attach to the controller's pins. That SPI programmer then rewrites the firmware of the chip—which in Ruytenberg's video demo takes a little over two minutes—essentially turning off its security settings. "I analyzed the firmware and found that it contains the security state of the controller," Ruytenberg says. "And so I developed methods to change that security state to 'none.' So basically disabling all security." An attacker can then plug a device into the Thunderbolt port that alters its operating system to disable its lock screen, even if it's using full disk encryption. The full attack Ruytenberg shows in his demo video uses only about $400 dollars worth of equipment, he says, but requires an SPI programmer device and a $200 peripheral that can be plugged into a Thunderbolt port to carry out the direct memory attack that bypasses the lockscreen, like the AKiTiO PCIe Expansion Box Ruytenberg used. But he argues that a better-funded hacker could build the entire setup into a single small device for around $10,000. "Three-letter agencies would have no problem miniaturizing this," Ruytenberg says. The fact that Thunderbolt remains a viable attack method for evil maids isn't entirely unexpected, says Karsten Nohl, a well-known hardware security researcher and founder of SR Labs, who reviewed Ruytenberg's work. Nor should it freak out too many users, he says, given that it requires a certain level of sophistication and physical access to a victim machine. Still, he was surprised to see how easily Intel's "security levels" can be bypassed. "If you're adding an authentication scheme against hardware attacks and then you implement it in unsecured hardware...that’s the wrong way to tackle a hardware security problem," says Nohl. "It’s a false sense of protection." Ruytenberg says there's also a less invasive version of his Thunderspy attack, but it requires access to a Thunderbolt peripheral the user has plugged into their computer at some point. Thunderbolt devices set as "trusted" for a target computer contain a 64-bit code that Ruytenberg found he could access and copy from one gadget to another. That way he could bypass a target device's lockscreen without even opening the case. "There's no real cryptography involved here," Ruytenberg says. "You copy the number over. And that's pretty much it." That version of the Thunderspy attack only works, however, when the Thunderbolt port's security settings are configured to their default setting of allowing trusted devices. Ruytenberg shared his findings with Intel three months ago. When WIRED reached out to the company it responded in a blog post noting, as the researchers had, that Kernel DMA Protections prevent the attack. "While the underlying vulnerability is not new, the researchers demonstrated new physical attack vectors using a customized peripheral device," the blog post reads. (The researchers counter that the vulnerability is in fact new, and their attack uses only off-the-shelf components.) "For all systems, we recommend following standard security practices," Intel added, "including the use of only trusted peripherals and preventing unauthorized physical access to computers." An Unpatchable Flaw In a statement to WIRED, HP said it offers protection against direct memory attacks via the Thunderbolt port in "most HP Commercial PC and Mobile Workstation products that support Sure Start Gen5 and beyond," which includes systems that have launched since the beginning of 2019. "HP is also unique in that we are the only [computer manufacturer] that provides protection against DMA attacks via internal card (PCI) and Thunderbolt devices," the company added. "Protection from DMA attacks via Thunderbolt is enabled by default." Lenovo said that it "is assessing this new research along with our partners and will communicate with customers as appropriate." Samsung didn't respond to a request for comment. Dell said in a statement that "customers concerned about these threats should follow security best practices and avoid connecting unknown or untrusted devices to PC ports," and referred WIRED to Intel for more information. When WIRED asked Intel which computer manufacturers use its Kernel DMA Protection feature, it referred us back to the manufacturers. Ruytenberg points out that the flaws he found extend to Intel's hardware, and can't be fixed with a mere software update. "Basically they will have to do a silicon redesign," he says. Nor can users change the security settings of their Thunderbolt port in their operating system to prevent the attack, given that Ruytenberg discovered how to turn those settings off. Instead, he says that paranoid users may want to disable their Thunderbolt port altogether in their computer's BIOS, though the process of doing so will be different for every affected PC. On top of disabling Thunderbolt in BIOS, users will also need to enable hard disk encryption and turn their computers off entirely when they leave it unattended to be fully protected. Evil maid attacks have, of course, been possible in some cases for years. Firmware-focused security companies like Eclypsium have demonstrated five-minute physical access hacking of Windows machines using BIOS vulnerabilities, for instance, and WikiLeaks' Vault7 release included information about CIA tools designed to hack Macs' firmware with physical access techniques. But both of those sorts of attacks are based on vulnerabilities that can be patched; the CIA's attack was blocked by the time news of it leaked in 2017. Thunderspy, on the other hand, remains both unpatched and unpatchable for millions of computers. The owners of those machines may now need to upgrade to a model that has Kernel DMA Protection in place—or think twice about leaving their sleeping computers unattended. Source: Thunderbolt Flaws Expose Millions of PCs to Hands-On Hacking (Wired)
  8. Intel's Ice Lake chips are the newest attempt to make Thunderbolt relevant But USB is good enough for most of us -- and getting better. Support for high-speed Thunderbolt connections accounts for a sizable fraction of the circuitry on Intel's new 10nm Ice Lake processors. Stephen Shankland/CNET If you like the high-speed Thunderbolt port for plugging stuff into your PC, there's good news for this year and beyond. Thunderbolt debuted on MacBook Pro laptops in 2011 as an all-purpose port for monitors, storage systems and other high-end peripherals, and has since spread to Windows machines, too. This holiday season, though, Intel's new Ice Lake processor will make Thunderbolt more common by building support straight into the chip itself instead of relying on separate processors. The more mainstream alternative, USB, will get better in 2020 with a Thunderbolt technology infusion. But Intel has plans to improve Thunderbolt, too. "We have a very robust team that continues Thunderbolt development," said Chris Walker, Intel's PC chip chief, in a recent press briefing. Intel wouldn't say exactly how it hopes to improve Thunderbolt. Speed boosts are an obvious candidate, given Thunderbolt's usefulness in high-end computing. But fundamentally, it's not clear Thunderbolt will have a new answer to its biggest question: With USB's ubiquity and increasing speeds, will Thunderbolt ever become a truly mainstream technology? Nope, says Endpoint Technologies analyst Roger Kay. "This reminds me of IEEE 1394 all over again," Kay said, referring to the connection standard also called FireWire. "For a while, it had a technical advantage, and Applebacked it, but it wasn't standard, and eventually lost to USB." Except for specialty uses, Thunderbolt will "never get traction." 16 PHOTOS Meet Intel's Ice Lake processor, due to speed up PCs in 2019 Thunderbolt port power The Thunderbolt connections on all Macs and some Windows PCs can be used to connect peripherals like monitors, high-speed network adapters, ordinary hard drives and more capacious storage arrays. On laptops, a single Thunderbolt docking station can grant your PC access to a flash memory card reader, power cable, HDMI display, Ethernet network and USB mice and keyboards. Gamers and video editors can use Thunderbolt to plug in an external graphics card that's more powerful THAN what's built into laptops, too. Thunderbolt is fast, with the ability to transfer data at 40 gigabits per second. That's swift enough to copy the 2.5-hour Avengers: Infinity War movie -- a 8.4GB file for full HD resolution -- in 1.7 seconds. As important as its speed is Thunderbolt's ability to juggle multiple types of data, for example retrieving photos from a hard drive without causing any problems with a high-resolution 5K display. Intel's Thunderbolt is adept at "multiplexing" -- accommodating multiple data streams. USB 4 will get this ability from Thunderbolt in 2020. Intel Intel has opened up its once very proprietary technology, sharing Thunderbolt specifications freely so others can do things like build controller chips. Such gestures often improve a technology's fortunes, and indeed it's a reason Intel is bullish. "Processor integration [on Ice Lake chips], combined with the release of the protocol specification, is expected to drive large-scale, mainstream adoption of Thunderbolt 3," Intel said in a statement. Intel Ice Lake's Thunderbolt boost Thunderbolt has come a long way. It's now common on higher-end Windows laptops, too, and it shares the same port design as the newer USB-C. The number of PCs shipped with Thunderbolt doubles annually, now with tens of millions sold. The number of Thunderbolt peripherals available doubles at the same rate, with 450 certified products now on the market, Intel said. Ice Lake brings major help, though the chip is years late thanks to Intel's manufacturing difficulties. But Ice Lake is real now, with circuitry miniaturization that gave Intel the option to pack more abilities straight onto the chip. And Thunderbolt occupies a lot of chip area. "In our history, we never went through an integration of this size since we integrated graphics on Sandy Bridge," chips Intel debuted in 2011, said Ophir Edlis, a senior principal engineer, in a May briefing. Building Thunderbolt into Ice Lake means it'll use less power than today's approach with separate controller chips -- up to 300 milliwatts per port, Edlis said. With 4 ports, that's 1.2W saved. For comparison, Ice Lake chips will come in configurations that consume 9W, 15W or 28W. A 300mm silicon wafer covered with hundreds of Intel's new 10nm Ice Lake processors. Stephen Shankland/CNET Thunderbolt integration also means it's easier for PC makers to put two Thunderbolt ports on both sides of a laptop, Edlis said, and means circuit boards need less wiring. "We'll see more and more platforms adopting Thunderbolt," Edlis said. "The user experience is going to be much much better." USB: Thanks for the free help, Thunderbolt Arguably the biggest beneficiary of Thunderbolt's new openness is its biggest rival, Universal Serial Bus, aka the ubiquitous USB. USB 4, in the last stages of standardization now and due to arrive in products in late 2020 or so, is incorporating Thunderbolt 3 technology. That'll not only double its maximum speed to 40Gbps but also give it flexibility missing from USB 3, like the ability to intermix time-sensitive video data for monitors with other information. That should also increase the utility of USB hubs and docking stations, too. Although Thunderbolt devices can offer superior performance, you'll often pay a premium. A Seagate 1TB external USB drivecosts $45 on Amazon, for example, but a 1TB Thunderbolt model from Seagate subsidiary LaCie costs $70. Another big challenge is Thunderbolt's absence on mobile devices like iPads, iPhones and Android phones. We don't plug peripherals into them as commonly as we do with PCs, but they're a steadily increasing presence in our computing lives. So while there's no doubt Thunderbolt is getting better, USB's improvements mean it'll likely remain more niche than mainstream. Source
  • Create New...