Skip to main content

Questions tagged [physical-access]

The best security measures can be rendered useless if you don't physically protect your systems. An intruder can steal a computer, server, or smartphone, then crack the password at his leisure. (Source: "Physical access". Wikipedia. Citing: Michael Meyers. ISBN 978-0-07-225345-0. McGraw-Hill Education.)

2 votes
2 answers
154 views

We would like to sell a device (Raspberry Pi) to our customers that does process customer data. The device contains sensitive data and software to which the customer should not have access. The ...
HugoTheHolz's user avatar
1 vote
0 answers
110 views

My partner who knew my pin to my iPhone 14 took off with my phone for 3 days and when it was returned it was appeared off like it appeared a smaller screen resolution and inspecting it I noticed 2 ...
Kenneth Slz's user avatar
1 vote
1 answer
162 views

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop ...
allexj's user avatar
  • 537
-1 votes
2 answers
338 views

Suppose you need a laptop repair, so you bring it to A big box store where you have some sort of coverage (who will have the computer for 2-3 weeks) A small chain of repair shops a small independent ...
SurferTaco's user avatar
1 vote
1 answer
452 views

I've gone through a related question on how to protect data in case of unauthorized physical access to a server, where the consensus seemed to be that preventing data access when someone has physical ...
Lucas's user avatar
  • 111
1 vote
0 answers
307 views

Context I'm working to make an embedded devices safe against physical access. (publicly accessible device and can be easily stolen) I already made the following action : secure boot is enabled on cpu,...
Anthony's user avatar
  • 111
0 votes
1 answer
172 views

What can I do to check a potential "evil maid attack"?
Kour Koumpinos's user avatar
1 vote
1 answer
355 views

I'm in the process of figuring out an encryption strategy for a personal Linux system. My laptop is almost always on, or in sleep mode, except for longer travels. My main threats are theft of my ...
CryptGuest's user avatar
1 vote
1 answer
148 views

UPDATE : i know i modify the post significantly, will try to not do that anymore. Please read from scratch Let's imagine we have a machine that holds customer private keys to various crypto assets, ...
vach's user avatar
  • 111
0 votes
2 answers
227 views

How can I create a fake desktop environment and file system, that automatically starts as default when booting up, and may be exited out of by doing a specific action? (Like a keystroke) to prevent ...
Anm's user avatar
  • 123
0 votes
2 answers
283 views

I had a card like a credit card that I used to use for work. It was an ID card, and it had an access code, a swiper, a barcode, my picture, my name, my rank, my license, the name of the company, and ...
A google worker's user avatar
0 votes
3 answers
705 views

I have physical access to a Linux computer (Ubuntu 20.04). My colleague asked me what an attacker could do if he had physical access to this computer? I would like to know if, by default (after a ...
Poubelle Dirty's user avatar
0 votes
1 answer
176 views

The question is mainly stated in the title. I was wondering what kind of attacks can be launched on such a setup, where someone has access to a running OS with locked screen (needs password for the ...
tur11ng's user avatar
  • 101
1 vote
0 answers
313 views

This assumes that: Machine is powered off No UEFI backdoors No Reflashing the firmware No clearing the NVRAM (The point is to modify/read a small amount of NVRAM, instead of resetting it) Device ...
A-random-nerd's user avatar
0 votes
1 answer
222 views

I am travelling soon, and my country has passed tyrannical laws that allow them to demand passcodes to devices, and I believe that they are increasingly beginning to violate privacy rights. I would ...
user280375's user avatar

15 30 50 per page
1
2 3 4 5
10