Are you Worried about the Thunderbolt attack? Get a Windows 10 Secured-Core PC.
Microsoft Argues that Windows 10 can block Thunderspy Attack.

Microsoft has laid out how its new variety of Windows 10 Secured-Core PCs can assist organizations with alleviating the danger of the as of late uncovered Thunderspy assaults on gadgets with a Thunderbolt interface.
SECURITY
Best encryption programming for business in 2020: BitLocker, FileVault, Guardium, and that's only the tip of the iceberg
Best security enters in 2020: Hardware-based two-factor confirmation for online assurance
Best secret phrase directors for business in 2020: 1Password, Keeper, LastPass, and the sky is the limit from there
Digital security 101: Protect your protection from programmers, spies, and the legislature
Microsoft has worked with OEMs to make a solidified line of Windows 10 PCs under the Secured-Core brand, for example, its own Surface Pro X, the HP Elite Dragonfly, the Dell Latitude 7400 convertible and Lenovo ThinkPad X1 Yoga fourth era.
Most Secured-Core PCs transport with Thunderbolt, yet no Surface gadget does because Microsoft had worries over Thunderbolt's immediate access to memory.
In any case, Windows 10 Secured-Core PCs do have security that includes that shield it from difficult to-square part malware, for example, the RobbinHood ransomware, which utilized an appropriately marked yet vindictive motherboard driver to incapacitate security items from the portion.
All Secured-Core PCs, which Microsoft declared in October, transport with the security include part Direct Memory Access (DMA) assurance for Thunderbolt 3 to ensure against assaults requiring physical access, for example, Thunderspy, the assault definite this week by Dutch scientist Björn Rutenberg. The assault is not kidding because an assailant can take information regardless of whether the gadget is a secret word secured and information is encoded.
Bit DMA insurance is the key relief Intel illustrated in its reaction to the Thunderspy assaults, yet at present very few PCs have the component empowered. Other than that, Intel exhorted clients not to leave their machine unattended.
Rutenberg said Thunderspy totally broke Intel's Thunderbolt fringe whitelisting security include, and permitted an aggressor to make noxious Thunderbolt gadget characters to peruse and duplicate insider facts from memory and encoded drives.
Microsoft has laid out how various security highlights of Secured-Core PCs can frustrate every one of the four stages required by the Thunderspy assault.
Assailants first attachment a sequential fringe interface (SPI) streak developer called Bus Pirate into the SPI glimmer of the objective gadget, which offers access to the Thunderbolt controller firmware and permits them to duplicate it to another gadget.
In stages two and three, Thunderspy's Thunderbolt Controller Firmware Patcher (TCP) cripples Thunderbolt's firmware security mode and afterward composes back a changed and uncertain duplicate of Thunderbolt firmware to the SPI glimmer of the objective gadget.
The fourth step includes associating a Thunderbolt-based assault gadget to the objective and utilizing an instrument called PCILeech to stack a portion module that sidesteps the Windows sign-in screen.
"The outcome is that an aggressor can get to a gadget without knowing the sign-in secret phrase for the gadget," clarifies Nazmus Sakib, a senior program lead on Microsoft's equipment security in Azure's Core Operating Systems and Intelligent Edge group.
"This suggests whether a device was controlled off by the customer, someone that could get physical access to the device in the time it takes to run the Thunderspy procedure could sign in and exfiltrate information from the framework or introduce malevolent programming."
Sakib says bit DMA insurance is empowered as a matter of course on Secured-Core PCs, and this component forestalls an assailant getting to the Thunderbolt port except if the assault has picked up the casualty's secret phrase. This doesn't mean Secured-Core PCs are insusceptible to Thunderspy, yet Sakib contends they make it altogether progressively hard for the aggressor.
The other primary relief against Thunderspy is hypervisor-ensured code honesty (HVCI), which again is on as a matter of course.
the run of the bit.
Notwithstanding confining the checks, HVCI likewise guarantees that part code can't be both writable and executable, guaranteeing that unsubstantiated code doesn't execute," said Sakib. +- legitimately marked, not renounced, and not depend on overwriting executable piece code."