Skip to main content

Questions tagged [physical]

The use of physical measures (such as locks and tamper-proofing) or policies (such as Clean Desk) in order to protect sensitive information from unauthorized access.

11 votes
2 answers
3k views

Suppose I have the privilege to being able to physically meet a person that I want to communicate with beforehand. Suppose the person and I have minimal trust --- it could be the first time we get to ...
Guanyuming He's user avatar
1 vote
1 answer
162 views

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop ...
allexj's user avatar
  • 537
-1 votes
2 answers
338 views

Suppose you need a laptop repair, so you bring it to A big box store where you have some sort of coverage (who will have the computer for 2-3 weeks) A small chain of repair shops a small independent ...
SurferTaco's user avatar
0 votes
0 answers
124 views

I am getting the idea that Doorking's ProxPlus cards and reader have a pre-defined encryption key in their reader. As these readers are wiegand devices and the software for the Doorking Access systems ...
steve vogel's user avatar
0 votes
2 answers
284 views

As I pointed out here in February 2022, people who gained brief direct or remote access to a machine can change the volume step or other things regarding sudden large changes to the sound volume (for ...
mYnDstrEAm's user avatar
18 votes
3 answers
12k views

I've recently obtained a new notebook, specifically a Thinkpad. Now I found out that it has a fingerprint reader integrated into the power button. I am skeptical about biometrics as a security ...
programonkey's user avatar
1 vote
1 answer
539 views

I've been looking into rowhammer attacks and mitigations and there are two (what seem to be) mitigations that I've seen that are actually implemented in currently available hardware and software, but ...
LanMan2-4601's user avatar
0 votes
3 answers
705 views

I have physical access to a Linux computer (Ubuntu 20.04). My colleague asked me what an attacker could do if he had physical access to this computer? I would like to know if, by default (after a ...
Poubelle Dirty's user avatar
54 votes
11 answers
12k views

Floppy disks used to have a physical means of preventing writing to them. No software could bypass that, no matter what. It had to be flicked physically and manually by a human being. Modern SD cards ...
Polnow's user avatar
  • 549
1 vote
1 answer
378 views

I need to safely dispose of about 30 federal folders. That means 95% of the documents will be shredded and the rest stored. I bought a small shredder for private people (professional shredders are too ...
Sybil's user avatar
  • 1,501
2 votes
2 answers
368 views

I watched a documentary where hackers entered a victim's house by pretending to be from the ISP and then connected a box to a router in order to spy on all of the victim's traffic. Later, the hackers ...
Noodler's user avatar
  • 23
0 votes
1 answer
176 views

The question is mainly stated in the title. I was wondering what kind of attacks can be launched on such a setup, where someone has access to a running OS with locked screen (needs password for the ...
tur11ng's user avatar
  • 101
3 votes
0 answers
286 views

Whenever I leave my computer for the bathroom or anything inside the living space, I press WinKey + L to enter the "Lock Screen" mode. (If I go outside, I turn it off completely.) Let's say ...
Derrol H.'s user avatar
4 votes
1 answer
788 views

I've seen this question: Is it possible to determine if the BIOS has been modified between two points in time? On my Linux PC, I've made a script that checks the MD5 hash of the boot partition to ...
nb52er's user avatar
  • 41
2 votes
0 answers
243 views

What are the best practices to be followed to maintain security in the manufacturing site where camera phones are allowed? I'm working on one of the largest manufacturing facility where few of the R&...
Baranikumar Venkatesan's user avatar

15 30 50 per page
1
2 3 4 5
27