The hacker as reverse engineer benefits a lot from low-level access.
I agree that USB-C might be helpful in that respect, but it totally depends on the drivers. If there is a device that I can make hiccup through timing attacks it depends on what liberties I have in the driver.
For Bluetooth for example you have Ubertooth. If the Bluetooth radio on my laptop would be accessible on a low enough level there would be no need to use other hardware to execute attacks.
I'm just a hobbyist with a jtag programmer, some digital analysis, nothing fancy. A professional reverse engineer is another beast with microscopes, etc.
A hacker in the form of someone exploiting vulnerabilities in web applications does benefit not from a single computer, but from many. I don't think he/she would care about the specs too much.
I agree that USB-C might be helpful in that respect, but it totally depends on the drivers. If there is a device that I can make hiccup through timing attacks it depends on what liberties I have in the driver.
For Bluetooth for example you have Ubertooth. If the Bluetooth radio on my laptop would be accessible on a low enough level there would be no need to use other hardware to execute attacks.
I'm just a hobbyist with a jtag programmer, some digital analysis, nothing fancy. A professional reverse engineer is another beast with microscopes, etc.
A hacker in the form of someone exploiting vulnerabilities in web applications does benefit not from a single computer, but from many. I don't think he/she would care about the specs too much.