Skip to main content

Questions tagged [physical]

The use of physical measures (such as locks and tamper-proofing) or policies (such as Clean Desk) in order to protect sensitive information from unauthorized access.

4 votes
4 answers
631 views

Roughly speaking HSM is supposed to ingest or generate some secret material (key) and then never export them through the command interface. The keys can only be used according to their configured ...
user1641237's user avatar
8 votes
8 answers
2k views

How can I defend against a dropbox in an IP-based, wired camera system? I want to install security cameras at my house. One of the locations (on the street-facing side) isn't especially secure (hence ...
Michael Altfield's user avatar
11 votes
2 answers
3k views

Suppose I have the privilege to being able to physically meet a person that I want to communicate with beforehand. Suppose the person and I have minimal trust --- it could be the first time we get to ...
Guanyuming He's user avatar
1 vote
1 answer
195 views

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop ...
allexj's user avatar
  • 547
-1 votes
2 answers
384 views

Suppose you need a laptop repair, so you bring it to A big box store where you have some sort of coverage (who will have the computer for 2-3 weeks) A small chain of repair shops a small independent ...
SurferTaco's user avatar
-3 votes
2 answers
405 views

As I pointed out here in February 2022, people who gained brief direct or remote access to a machine or introduce malicious code or code vulnerable to this can change the volume step or other things ...
mYnDstrEAm's user avatar
18 votes
3 answers
13k views

I've recently obtained a new notebook, specifically a Thinkpad. Now I found out that it has a fingerprint reader integrated into the power button. I am skeptical about biometrics as a security ...
programonkey's user avatar
1 vote
1 answer
645 views

I've been looking into rowhammer attacks and mitigations and there are two (what seem to be) mitigations that I've seen that are actually implemented in currently available hardware and software, but ...
LanMan2-4601's user avatar
0 votes
3 answers
773 views

I have physical access to a Linux computer (Ubuntu 20.04). My colleague asked me what an attacker could do if he had physical access to this computer? I would like to know if, by default (after a ...
Poubelle Dirty's user avatar
54 votes
11 answers
12k views

Floppy disks used to have a physical means of preventing writing to them. No software could bypass that, no matter what. It had to be flicked physically and manually by a human being. Modern SD cards ...
Polnow's user avatar
  • 549
1 vote
1 answer
475 views

I need to safely dispose of about 30 federal folders. That means 95% of the documents will be shredded and the rest stored. I bought a small shredder for private people (professional shredders are too ...
Sybil's user avatar
  • 1,521
2 votes
2 answers
415 views

I watched a documentary where hackers entered a victim's house by pretending to be from the ISP and then connected a box to a router in order to spy on all of the victim's traffic. Later, the hackers ...
Noodler's user avatar
  • 23
0 votes
1 answer
187 views

The question is mainly stated in the title. I was wondering what kind of attacks can be launched on such a setup, where someone has access to a running OS with locked screen (needs password for the ...
tur11ng's user avatar
  • 101
3 votes
0 answers
315 views

Whenever I leave my computer for the bathroom or anything inside the living space, I press WinKey + L to enter the "Lock Screen" mode. (If I go outside, I turn it off completely.) Let's say ...
Derrol H.'s user avatar
4 votes
1 answer
854 views

I've seen this question: Is it possible to determine if the BIOS has been modified between two points in time? On my Linux PC, I've made a script that checks the MD5 hash of the boot partition to ...
nb52er's user avatar
  • 41

15 30 50 per page
1
2 3 4 5
27