Skip to main content

Questions tagged [tamper-resistance]

4 votes
4 answers
649 views

Roughly speaking HSM is supposed to ingest or generate some secret material (key) and then never export them through the command interface. The keys can only be used according to their configured ...
user1641237's user avatar
0 votes
2 answers
643 views

Assumption a customer is sitting in a public area connected to a public wifi. A threat actor can access the customer's browser and read all Javascript variables. Step 1. example.com server sends the ...
user1068636's user avatar
1 vote
1 answer
195 views

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop ...
allexj's user avatar
  • 547
0 votes
1 answer
799 views

Is there a way to prevent a Windows 10/11 system to access/modify/delete data from a secondary linux drive? I understand I can encrypt the linux drive, but wouldn't the windows system be still able to ...
Mr. D.'s user avatar
  • 1
37 votes
8 answers
8k views

Is it possible to know whether a textfile, e.g. in XML format, has been edited or tampered with over time? The context to my question follows: I am a scientist in industry using a technology called ...
Drew Gibson's user avatar
0 votes
0 answers
261 views

How smart cards technically store their secrets? I know smart card is whole computer on chip and it respond only to challenges. I know their software/firmware doesn't allow (it doesn't have the ...
Virer's user avatar
  • 1
12 votes
3 answers
4k views

An application runs on an embedded battery-powered PC, accessible to some restricted public, that stores secrets in RAM. To prevent cold boot attacks and that the PC is stolen to extract its secrets, ...
SDL's user avatar
  • 223
43 votes
2 answers
8k views

A number of crypto-dongles make the claim that it is impossible to extract the stored private key once written. Yubico: The YubiKey AES Key information can never be extracted from a YubiKey ...
Praxeolitic's user avatar
14 votes
2 answers
2k views

What would be the best practices for securing a single-purpose Windows laptop against a determined foreign intelligence agency from tampering with data on the machine? The machine would be used ...
RogerMKE's user avatar
  • 243
1 vote
2 answers
1k views

When sending a request (POST, PUT, etc). I have a security requirement to ensure that the data in the payload has not been tampered with. In other words I need to know with certainty that the data ...
user1709076's user avatar
3 votes
2 answers
528 views

The Ethereum website says that it provides a "cryptographically secure, decentralized, tamper-proof network" on which applications written in the Solidity contract language could be deployed. (https://...
bmiller59's user avatar
0 votes
1 answer
191 views

Suppose I want to print a human readable 10 digit serial using ordinary day today printer but the printer is communal printer and manned. My intention is for the person manning the printer to not read ...
Flood Gravemind's user avatar
3 votes
2 answers
7k views

If I have an HTML form, and it has hidden inputs for ID numbers and the like (so I know the id key of of table x to update), how can I secure it so the person can't just change it and screw up ...
johnny's user avatar
  • 651
2 votes
1 answer
3k views

Samsung phones come with a security seal that says you should not buy the phone if it is broken. Is this proof that no one has tampered with the phone? Is there some way to take off the seal and ...
Linux_user0987's user avatar
3 votes
5 answers
3k views

Say I have some Apache logs that show brute force attempts on a login page. I've singled out the IP, and found out who the culprit was. How can I show to a third party that I didn't makeup the entries ...
TACO's user avatar
  • 33

15 30 50 per page