Isolating the communications is good
In general, IoT attacks occur via normal communications mechanisms and less likely via hardware. In some areas the latter is fairly common; smart meters, set top boxes, etc. It is interesting to see MS isolate the basic communications outside of the main functionality. I wonder how far the isolation goes. Would a driver issue create main kernel issues or is it isolated to the baseband co-processors?
Moreover, how do you isolate higher level communication stack vulnerabilities from the rest of the system?
Maybe someone can educate me.
Also, I think MS intends to open up the VHDL to inspection, right? If not it will be an uphill battle to expose issues.