Also left out of the headline is the fact that this attack was specifically designed to be leveraged against one specific common laptop, a MacBook. Admittedly, if you are using one it can be a concern, but it’s safe to assume that unless your attacker knows the exact model of computer you are using and dedicates serious resources in to building a targeted attack like this, you’re fine.
The tiniest variation will likely dramatically improve your security.
As a cybersecurity researcher, there are plenty of other attacks that are cheaper and easier to implement that you should be concerned about.
Also left out of the headline is the fact that this attack was specifically designed to be leveraged against one specific common laptop, a MacBook. Admittedly, if you are using one it can be a concern, but it’s safe to assume that unless your attacker knows the exact model of computer you are using and dedicates serious resources in to building a targeted attack like this, you’re fine.
The tiniest variation will likely dramatically improve your security.
As a cybersecurity researcher, there are plenty of other attacks that are cheaper and easier to implement that you should be concerned about.