Questions tagged [hardware]
For attacks against, or best practices for physical components of an Information Technology system. It can consist of network equipment, servers, CPUs, hardware security module, smartcards, etc. When using this tag, also include an additional tag for the specific type of hardware.
593
questions
1
vote
0
answers
34
views
How to recycle dead Google Pixel laptop?
I have old Google Pixel laptop that is not working anymore. I cannot charge it and it would not start.
I have a number of apps installed there, linked to my current account (for example, social media ...
1
vote
0
answers
21
views
"PUF CRPs authentication requires trust in manufacturer since it's him who performs the storage of CRPs"....?
"PUF CRPs authentication requires trust in manufacturer since it's him who performs the storage of CRPs".
So does it mean that we have to trust manufacturer, because he could replace the ...
1
vote
0
answers
38
views
Laser pulse/injection attacks, Xray inspection, Test-based(like JTAG scan chain) attacks, Microprobing attacks... are these invasive or non-invasive?
Laser pulse/injection attacks, Xray inspection, Test-based(like JTAG scan chain) attacks, Microprobing attacks... are these invasive or non-invasive?
Just curiosity. I don't know how to categorize.
My ...
1
vote
0
answers
38
views
Is PUF Challenge-Response Authentication applied on every power-up event? [closed]
Are PUFs used, EVERY time we power on the computer to verify that nothing has been tampered with (by using CRP authentication)?
Which element performs this authentication? (bios, secureboot, I don't ...
1
vote
1
answer
90
views
How to update BIOS before BIOS infected Host reinfects BIOS?
I learned about the BIOS being able to be written to by malware. It reminded me I have a used laptop that performs noticeably slower than any comparable devices, so I went ahead an downloaded BIOS ...
1
vote
1
answer
50
views
Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key?
Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop ...
0
votes
1
answer
80
views
Salvageable computer parts after being hacked [duplicate]
(edited)
My question main is much pretty where can malware hide after it's infected your computer and what parts should I keep and throw away to make sure the infection no longer spreads. Does factory ...
0
votes
0
answers
53
views
EEPROM with HDD calibration data
I understand that in a Hard Disk Drive (HDD) there is EEPROM which stores calibration data. This is not directly accessible by any ring-3 (usermode) or ring-0 (kernel mode) programs.
I was curious as ...
15
votes
7
answers
4k
views
Choosing laptop brand for company
Recently we have been wondering whether it makes a difference (from a security and privacy perspective) what brand laptops should be used in our company. I have heard wild stories about backdoors ...
0
votes
0
answers
64
views
Can a computer peripheral (keyboard) be more sophisticated than meets the eye and steal data? [duplicate]
There are lots of mechanical keyboards out on the market now. When you buy one from a known name it's likely there's nothing nefarious going on. But no name peripherals have flooded the market. Cheap ...
1
vote
0
answers
65
views
Minimizing trust assumptions in Messaging Protocols
As I was listening to an interview yesterday, the journalist claimed that his Signal communications were being spied on by the NSA. Whether to believe him or not is subjective. Still, it is an ...
1
vote
3
answers
203
views
Does emulation/software virtualization provide more isolation/security vs hardware virtualization?
From my understanding:
I can emulate many different architectures and systems with qemu as a user(mode) process.
There is separate user address space per process.
If a malicious process were to ...
0
votes
1
answer
117
views
How is the authenticity and integrity of the various chips inside laptops and mobile phones ensured by their vendors?
Modern laptops and mobile phone platforms are built around a main, beefy SoC, which generally supports Secure Boot for its firmware and also has a unique hardware identity that is used to attest to a ...
1
vote
2
answers
157
views
Is hardware linked between different operating systems installed in same computer?
I know the safest bet If I want to remain anonymous is having 2 separate computers, but I was curious if having 2 OS in different hard drives (both encrypted) but on same computer the same? Is the ...
0
votes
0
answers
73
views
How can we verify the security of a device? [duplicate]
I've recently been experiencing a situation as follows:
How can I understand the IO of an unknown device?
Say, for example, I am gifted a bluetooth speaker. How can I understand its potential for ...