Skip to main content

Questions tagged [hardware]

For attacks against, or best practices for physical components of an Information Technology system. It can consist of network equipment, servers, CPUs, hardware security module, smartcards, etc. When using this tag, also include an additional tag for the specific type of hardware.

1 vote
0 answers
34 views

How to recycle dead Google Pixel laptop?

I have old Google Pixel laptop that is not working anymore. I cannot charge it and it would not start. I have a number of apps installed there, linked to my current account (for example, social media ...
JoeBloggs's user avatar
1 vote
0 answers
21 views

"PUF CRPs authentication requires trust in manufacturer since it's him who performs the storage of CRPs"....?

"PUF CRPs authentication requires trust in manufacturer since it's him who performs the storage of CRPs". So does it mean that we have to trust manufacturer, because he could replace the ...
allexj's user avatar
  • 129
1 vote
0 answers
38 views

Laser pulse/injection attacks, Xray inspection, Test-based(like JTAG scan chain) attacks, Microprobing attacks... are these invasive or non-invasive?

Laser pulse/injection attacks, Xray inspection, Test-based(like JTAG scan chain) attacks, Microprobing attacks... are these invasive or non-invasive? Just curiosity. I don't know how to categorize. My ...
allexj's user avatar
  • 129
1 vote
0 answers
38 views

Is PUF Challenge-Response Authentication applied on every power-up event? [closed]

Are PUFs used, EVERY time we power on the computer to verify that nothing has been tampered with (by using CRP authentication)? Which element performs this authentication? (bios, secureboot, I don't ...
allexj's user avatar
  • 129
1 vote
1 answer
90 views

How to update BIOS before BIOS infected Host reinfects BIOS?

I learned about the BIOS being able to be written to by malware. It reminded me I have a used laptop that performs noticeably slower than any comparable devices, so I went ahead an downloaded BIOS ...
I like to code's user avatar
1 vote
1 answer
50 views

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key?

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop ...
allexj's user avatar
  • 129
0 votes
1 answer
80 views

Salvageable computer parts after being hacked [duplicate]

(edited) My question main is much pretty where can malware hide after it's infected your computer and what parts should I keep and throw away to make sure the infection no longer spreads. Does factory ...
Weissman's user avatar
0 votes
0 answers
53 views

EEPROM with HDD calibration data

I understand that in a Hard Disk Drive (HDD) there is EEPROM which stores calibration data. This is not directly accessible by any ring-3 (usermode) or ring-0 (kernel mode) programs. I was curious as ...
user5623335's user avatar
15 votes
7 answers
4k views

Choosing laptop brand for company

Recently we have been wondering whether it makes a difference (from a security and privacy perspective) what brand laptops should be used in our company. I have heard wild stories about backdoors ...
rgedn's user avatar
  • 151
0 votes
0 answers
64 views

Can a computer peripheral (keyboard) be more sophisticated than meets the eye and steal data? [duplicate]

There are lots of mechanical keyboards out on the market now. When you buy one from a known name it's likely there's nothing nefarious going on. But no name peripherals have flooded the market. Cheap ...
Xxe Yêd's user avatar
1 vote
0 answers
65 views

Minimizing trust assumptions in Messaging Protocols

As I was listening to an interview yesterday, the journalist claimed that his Signal communications were being spied on by the NSA. Whether to believe him or not is subjective. Still, it is an ...
enricobottazzi's user avatar
1 vote
3 answers
203 views

Does emulation/software virtualization provide more isolation/security vs hardware virtualization?

From my understanding: I can emulate many different architectures and systems with qemu as a user(mode) process. There is separate user address space per process. If a malicious process were to ...
ift-436t's user avatar
0 votes
1 answer
117 views

How is the authenticity and integrity of the various chips inside laptops and mobile phones ensured by their vendors?

Modern laptops and mobile phone platforms are built around a main, beefy SoC, which generally supports Secure Boot for its firmware and also has a unique hardware identity that is used to attest to a ...
Silviu's user avatar
  • 66
1 vote
2 answers
157 views

Is hardware linked between different operating systems installed in same computer?

I know the safest bet If I want to remain anonymous is having 2 separate computers, but I was curious if having 2 OS in different hard drives (both encrypted) but on same computer the same? Is the ...
Elias LP's user avatar
0 votes
0 answers
73 views

How can we verify the security of a device? [duplicate]

I've recently been experiencing a situation as follows: How can I understand the IO of an unknown device? Say, for example, I am gifted a bluetooth speaker. How can I understand its potential for ...
R S's user avatar
  • 101

15 30 50 per page
1
2 3 4 5
40