Questions tagged [air-gap]
An air gap or air wall is a network security measure
35 questions
3
votes
4
answers
1k
views
Unidirectional File Transfer (write only) Using Serial Adapter?
Building on This question -- I similarly want implement write-only transfer from an air gapped machine.
I noticed there are various serial-to-usb adapters available also.
What I'm wondering is, would ...
1
vote
1
answer
621
views
Resistance of data diode from side-channel attack
Are data diodes resistant to side-channel attacks?
For example, can hackers infer secret data from another computer by analyzing the signal of the data diode?
Assume that a Faraday cage isolates each ...
1
vote
0
answers
136
views
How to use one of Microsoft's new computers without leaking information?
Let's say I am interested in using one of Microsoft's new computers but I have concerns over the massive amount of data, personal behavior, and whatnot being consumed by the machine. Microsoft claims ...
0
votes
0
answers
280
views
Hash-Based Technique to Detect Ransomware Corruption on the Fly?
I have developed an Excel spreadsheet to compare lists of SHA-512 hashes from two separate drives. One drive is the source data drive on a Windows machine. The other is a backup of that drive, ...
2
votes
1
answer
3k
views
How do I securely transfer information between airgapped systems?
I'm trying to take information that's on Computer A, write it onto some form of persistent storage, and copy that information onto Computer B. Both will be running a relatively recent version of ...
22
votes
5
answers
8k
views
Unidirectional continuous data transfer to an air-gapped computer
What would be a way to transfer files in one direction from internet-facing computerA => air-gapped computerB to protect the files on computerB from unauthorised disclosure, short of using an ...
0
votes
0
answers
166
views
Can attackers send commands to/control infected air-gapped computers?
I've been reading up on malware that can bridge air gaps between computers, like GSMem, Funtenna, etc. In the papers and articles I've been reading, the researchers mostly talking about getting files ...
0
votes
0
answers
236
views
Using QR codes as means of communicating with an air-gap system [duplicate]
The air-gap system in question is a cryptocurrency vault system that is responsible for generating addresses and signing transactions while it keeps the sensitive information air-gapped.
[ Vault app ] ...
2
votes
1
answer
643
views
How to airgap properly? [closed]
Imagine I have the research papers on designing COVID-19, the cure and some nuke launch codes on my laptop and want to often communicate those to another computer at my home. I already installed a ...
0
votes
1
answer
323
views
How exploitable is a machine with a vulnerable library if it is not open to the internet? [closed]
Say I have a vulnerable library on a test machine, is it possible for an attacker to use that vulnerability to exploit the system and maybe the network, if the machine is not open to the internet?
2
votes
0
answers
250
views
Patch management for production servers
I'm trying to implement an automated patching program at a small SaaS provider.
When a customer signs up for our software, we provision them a Linux VM in our primary datacenter.
Each customer also ...
0
votes
2
answers
221
views
Eliminating possible watermarking done by text editors
On which text editor is it easiest to prevent and/or eliminate watermarking?
Pre-installed malware that defeats anonymity being used on an airgapped system can be made ineffective, at least partially,...
1
vote
1
answer
2k
views
Send and receive files in an air-gapped system
Is it possible to have an air-gapped system which can send and receive files?
From a high level perspective, I can't seem to figure out how this can work and I am starting to think it is impossible. ...
1
vote
1
answer
166
views
Possible to control desktop data activity LED on Windows or Linux for data extraction? [closed]
I am trying to extract data from an air-gapped computer as a project.
I already have a working prototype using high frequency sound and a key-logger.
I would like to find another way to do it without ...
1
vote
2
answers
269
views
Using command (dd if=/dev/mmcblk0p1 | sha1sum) while running from initramfs
I have an opensource airgapped raspberry pi project seen at the following link: www.privatekeyvault.com
I have provided a method for installing LUKS full disk encryption seen at the following: https:/...