Skip to main content

Questions tagged [air-gap]

An air gap or air wall is a network security measure

3 votes
4 answers
1k views

Building on This question -- I similarly want implement write-only transfer from an air gapped machine. I noticed there are various serial-to-usb adapters available also. What I'm wondering is, would ...
bigcodeszzer's user avatar
1 vote
1 answer
621 views

Are data diodes resistant to side-channel attacks? For example, can hackers infer secret data from another computer by analyzing the signal of the data diode?  Assume that a Faraday cage isolates each ...
Scientist NA's user avatar
1 vote
0 answers
136 views

Let's say I am interested in using one of Microsoft's new computers but I have concerns over the massive amount of data, personal behavior, and whatnot being consumed by the machine. Microsoft claims ...
Kevin Connors's user avatar
0 votes
0 answers
280 views

I have developed an Excel spreadsheet to compare lists of SHA-512 hashes from two separate drives. One drive is the source data drive on a Windows machine. The other is a backup of that drive, ...
Ray Woodcock's user avatar
2 votes
1 answer
3k views

I'm trying to take information that's on Computer A, write it onto some form of persistent storage, and copy that information onto Computer B. Both will be running a relatively recent version of ...
ijustlovemath's user avatar
22 votes
5 answers
8k views

What would be a way to transfer files in one direction from internet-facing computerA => air-gapped computerB to protect the files on computerB from unauthorised disclosure, short of using an ...
light108's user avatar
  • 329
0 votes
0 answers
166 views

I've been reading up on malware that can bridge air gaps between computers, like GSMem, Funtenna, etc. In the papers and articles I've been reading, the researchers mostly talking about getting files ...
user942937's user avatar
0 votes
0 answers
236 views

The air-gap system in question is a cryptocurrency vault system that is responsible for generating addresses and signing transactions while it keeps the sensitive information air-gapped. [ Vault app ] ...
Ashfame's user avatar
  • 101
2 votes
1 answer
643 views

Imagine I have the research papers on designing COVID-19, the cure and some nuke launch codes on my laptop and want to often communicate those to another computer at my home. I already installed a ...
Vorac's user avatar
  • 1,907
0 votes
1 answer
323 views

Say I have a vulnerable library on a test machine, is it possible for an attacker to use that vulnerability to exploit the system and maybe the network, if the machine is not open to the internet?
ssn's user avatar
  • 111
2 votes
0 answers
250 views

I'm trying to implement an automated patching program at a small SaaS provider. When a customer signs up for our software, we provision them a Linux VM in our primary datacenter. Each customer also ...
crab's user avatar
  • 17
0 votes
2 answers
221 views

On which text editor is it easiest to prevent and/or eliminate watermarking? Pre-installed malware that defeats anonymity being used on an airgapped system can be made ineffective, at least partially,...
Patriot's user avatar
  • 297
1 vote
1 answer
2k views

Is it possible to have an air-gapped system which can send and receive files? From a high level perspective, I can't seem to figure out how this can work and I am starting to think it is impossible. ...
oshirowanen's user avatar
1 vote
1 answer
166 views

I am trying to extract data from an air-gapped computer as a project. I already have a working prototype using high frequency sound and a key-logger. I would like to find another way to do it without ...
shelbaz's user avatar
  • 11
1 vote
2 answers
269 views

I have an opensource airgapped raspberry pi project seen at the following link: www.privatekeyvault.com I have provided a method for installing LUKS full disk encryption seen at the following: https:/...
John Shearing's user avatar

15 30 50 per page