Questions tagged [physical-access]
The best security measures can be rendered useless if you don't physically protect your systems. An intruder can steal a computer, server, or smartphone, then crack the password at his leisure. (Source: "Physical access". Wikipedia. Citing: Michael Meyers. ISBN 978-0-07-225345-0. McGraw-Hill Education.)
140 questions
2 votes
2 answers
154 views
Block access to device except USB
We would like to sell a device (Raspberry Pi) to our customers that does process customer data. The device contains sensitive data and software to which the customer should not have access. The ...
1 vote
0 answers
110 views
Evil maid attack after my iPhone disappeared and returned 2 days later [closed]
My partner who knew my pin to my iPhone 14 took off with my phone for 3 days and when it was returned it was appeared off like it appeared a smaller screen resolution and inspecting it I noticed 2 ...
1 vote
1 answer
162 views
Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key?
Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop ...
-1 votes
2 answers
338 views
Laptop Repair vs. Evil Maid
Suppose you need a laptop repair, so you bring it to A big box store where you have some sort of coverage (who will have the computer for 2-3 weeks) A small chain of repair shops a small independent ...
1 vote
1 answer
452 views
How to protect a local server if someone has physical access to it?
I've gone through a related question on how to protect data in case of unauthorized physical access to a server, where the consensus seemed to be that preventing data access when someone has physical ...
1 vote
0 answers
307 views
How to safely use dm-crypt as overlayfs uper partition?
Context I'm working to make an embedded devices safe against physical access. (publicly accessible device and can be easily stolen) I already made the following action : secure boot is enabled on cpu,...
0 votes
1 answer
172 views
How to check if someone used my desktop or any other device
What can I do to check a potential "evil maid attack"?
1 vote
1 answer
355 views
How to protect files in use on a system powered on from physical theft or tampering?
I'm in the process of figuring out an encryption strategy for a personal Linux system. My laptop is almost always on, or in sleep mode, except for longer travels. My main threats are theft of my ...
1 vote
1 answer
148 views
Theoretical unbreakable security for a single compute instance/machine [closed]
UPDATE : i know i modify the post significantly, will try to not do that anymore. Please read from scratch Let's imagine we have a machine that holds customer private keys to various crypto assets, ...
0 votes
2 answers
227 views
Preventing low-skill physical access by creating fake desktop environment
How can I create a fake desktop environment and file system, that automatically starts as default when booting up, and may be exited out of by doing a specific action? (Like a keystroke) to prevent ...
0 votes
2 answers
283 views
Shred, cut, melt, smash, grind, then flush, is it secure disposal of a security access id card?
I had a card like a credit card that I used to use for work. It was an ID card, and it had an access code, a swiper, a barcode, my picture, my name, my rank, my license, the name of the company, and ...
0 votes
3 answers
705 views
What can an attacker do with physical access to a Linux server?
I have physical access to a Linux computer (Ubuntu 20.04). My colleague asked me what an attacker could do if he had physical access to this computer? I would like to know if, by default (after a ...
0 votes
1 answer
176 views
What type of attacks can be carried against an OS with FDE, if we assume OS and FDE are implemented correctly?
The question is mainly stated in the title. I was wondering what kind of attacks can be launched on such a setup, where someone has access to a running OS with locked screen (needs password for the ...
1 vote
0 answers
313 views
How hard is it to modify UEFI nvram if the device is off and the UEFI is locked?
This assumes that: Machine is powered off No UEFI backdoors No Reflashing the firmware No clearing the NVRAM (The point is to modify/read a small amount of NVRAM, instead of resetting it) Device ...
0 votes
1 answer
222 views
How can I properly physically secure my devices from border inspection? [duplicate]
I am travelling soon, and my country has passed tyrannical laws that allow them to demand passcodes to devices, and I believe that they are increasingly beginning to violate privacy rights. I would ...