They exploit Thunderbolt, whose insecure "All your memory are belong to us" model is known. I wonder what the attackers would use on a non-Thunderbolt laptop (say, a ThinkPad, or a regular Dell/HP/What-Have-You).<p>Of course, using an Apple laptop to demo this makes a lot of sense: they are popular, almost ubiquitous, and they provide an external vector to full, direct memory access. But I don't think the scare factor holds up on a non-Apple device.