Make Your Electronics Tamper-Evident
AnarSec's article outlines methods to enhance electronic device security against tampering, including tamper-evident screws, transparent storage solutions, and secure operating systems like Qubes OS and Tails.
Read original articleAnarSec's article discusses methods to make electronic devices tamper-evident, particularly in the context of protecting laptops from unauthorized access. It highlights the risks posed by 'evil maid' attacks, where an attacker gains temporary access to a device to install malicious hardware or software. To mitigate these risks, the article suggests using tamper-evident laptop screws, which can be marked with unique glitter nail polish patterns that are difficult to replicate. This method allows users to detect any unauthorized access by comparing photos of the screws before and after potential tampering.
Additionally, the article recommends using transparent storage solutions for sensitive electronics when away from home, such as a box filled with colorful materials to create a mosaic that can be photographed for later comparison. The Blink Comparison app is suggested for verifying that the mosaic remains unchanged.
For software and firmware security, the article emphasizes the importance of using tamper-evident systems like Qubes OS, Tails, or GrapheneOS, which can notify users of any unauthorized changes. The Auditor app for GrapheneOS and Heads for Tails or Qubes OS are highlighted as tools for detecting tampering.
Finally, the article touches on physical intrusion detection systems, which can monitor spaces for unauthorized access. Overall, the piece provides practical advice for enhancing the security of electronic devices against physical and software compromises.
Related
Hacking eInk Price Tags (2021)
Hackers repurpose eInk electronic shelf labels (ESLs) into photo frames or status displays by customizing firmware. Detailed exploration of hacking challenges, including Marvell chip analysis, bootloader functions, memory storage, communication protocols, and debugging methods.
The good, the bad, and the weird (2018)
Trail of Bits delves into "weird machines" in software exploitation, complex code snippets evading security measures. Techniques like Hoare triples and dynamic_casts aid in identifying and preventing exploitation, crucial in evolving security landscapes.
Six Dumbest Ideas in Computer Security
In computer security, common misconceptions like "Default Permit," "Enumerating Badness," and "Penetrate and Patch" hinder effective protection. Emphasizing a "Default Deny" policy and proactive security design is crucial.
Privacy Guides Adds New "Hardware Recommendations" Section
Hardware plays a crucial role in data security, emphasizing the need for ongoing updates, trusted components, and effective privacy measures to protect against unauthorized access and vulnerabilities.
Hackers can wirelessly watch your screen via HDMI radiation
Researchers in Uruguay developed "Deep-TEMPEST," a technique using AI to wirelessly intercept HDMI video signals via electromagnetic radiation, raising security concerns for sensitive data protection against potential espionage.
- Several users share personal experiences and anecdotes related to tampering and security, highlighting the importance of vigilance.
- There is a discussion on the effectiveness and limitations of various tamper-evident technologies, with some suggesting that they may not be foolproof against determined attackers.
- Some commenters express skepticism about the practicality of constantly checking for tampering, questioning the feasibility of maintaining such security measures.
- Users mention the potential for advanced techniques, such as 3D printing, to bypass tamper-evident mechanisms, raising concerns about state actors and sophisticated threats.
- There is a call for more innovative solutions and algorithms to enhance security, indicating a desire for improved methods in the fight against tampering and counterfeiting.
A side note: I think there's an unmet need for algorithms that can convert photos of these random patterns into text (or something similar) that can be stored in a database and searched quickly for matching patterns. I've tried image similarity algorithms like the ones used by e.g. Google Reverse Image Search, but they seem poorly suited for this task. I ended up writing my own crude algorithm in the paper above that converts a pattern into a set of strings, and it works OK, but surely there are better ways to do this.
> For all spy cameras.. raw image.. encoding and compression.. takes place in an inbuilt read-write memory whose operations cause electromagnetic radiation (EMR).. Whenever the visual scene changes, bursts of video data processing.. aggravate the memory workload, bringing responsive EMR patterns. ESauron can detect spy cameras by intentionally stimulating scene changes and then sensing the surge of EMRs.. Experiments with 50 camera products show that ESauron can detect all spy cameras with an accuracy of 100% after only 4 stimuli, the detection range can exceed 20 meters even in the presence of blockages, and all spy cameras can be accurately located.
The U.S. Navy does authorize label-type seals but rates their security as "minimal". See page 6.3 of [2]
Defense Counterintelligence Agency has some security seal guidelines.[3] Probably outdated.
There are "tamper-evident seals with residue." If you remove them, it makes a visible mess. [4] They also have bar-coded serial numbers. A well-resourced attacker with a lot of access time and a preliminary run to get a look at the seals and have duplicates made could probably remove and replace those. If you're facing that level of threat you probably shouldn't have anything of interest in an unattended laptop.
[1] https://www.nispom.org/NISPOMwithISLsMay2014.pdf
[2] https://exwc.navfac.navy.mil/Portals/88/Documents/EXWC/DoD_L...
[3] https://www.dcsa.mil/Portals/91/Documents/CTP/NAO/security_s...
[4] https://seals.com/security-tape-labels/?_bc_fsnf=1&Classific...
https://youtube.com/watch?v=zZBR9iQ7DRA3D
The main character has a series of mechanisms (door latch height, paper in between door and wall, mechanical pencil lead in door hinge)
One out of place tamper seal, can ignore. But all 3 broken? Someone was in the room.
Personally used the paper trick when I was young and living with parents and siblings. Would easily know when somebody entered and trifled through my things.
Also used that mechanical lead pencil trick with my “secret” drawer where I had created a false bottom lol.
Like is the NSA covering their laptop screws in glitter nail polish? Are covert CIA agents? SOF?
Who needs this level of secrecy that would not have the physical security in place to protect the device in the first place?
Many years ago law enforcement (french DCRI now called DGSI) illegally placed a keylogger on my laptop, they placed it when I bought it online from materiel.net and placed it before I took delivery of it. it is 100% certain in my mind.
So never ever buy a laptop or hardware online if you think you might be exposed to this, buy it from a store.
I was going to build a hardware keylogger for laptops just for fun and as a proof-of-concept to show how easily this could be done.
On the other hand, I'd think they'd pay attention to actual tampering evidence.
Not just the police: if your data or the data of the organization you work for is considered valuable enough[0], you also have to worry about thieves, foreign spies/saboteurs, corporate espionage, a wayward relative looking for banking passwords or Bitcoin to fund their drug/gambling habit, or a particularly obsessive ex.
[0] Mine isn't, and paranoia isn't one of my vices, so this is all academic to me.
I'm looking at using this for certain shipping and packaging needs.
However it's worth not also gaining a false sense of security vs. state actors who buy software and hardware exploits from shops like Zerodium generally don't always require intrusive physical access to implant malware or extract information, or who use the local carriers to do the dirty work for them.
amazon dot com tamper tape
You can't open the case in a way that doesn't make it obvious it was opened.
I wonder who the anarchists are that are afraid of "incrimination and network mapping" and what it is they're doing them that makes them afraid of that
Related
Hacking eInk Price Tags (2021)
Hackers repurpose eInk electronic shelf labels (ESLs) into photo frames or status displays by customizing firmware. Detailed exploration of hacking challenges, including Marvell chip analysis, bootloader functions, memory storage, communication protocols, and debugging methods.
The good, the bad, and the weird (2018)
Trail of Bits delves into "weird machines" in software exploitation, complex code snippets evading security measures. Techniques like Hoare triples and dynamic_casts aid in identifying and preventing exploitation, crucial in evolving security landscapes.
Six Dumbest Ideas in Computer Security
In computer security, common misconceptions like "Default Permit," "Enumerating Badness," and "Penetrate and Patch" hinder effective protection. Emphasizing a "Default Deny" policy and proactive security design is crucial.
Privacy Guides Adds New "Hardware Recommendations" Section
Hardware plays a crucial role in data security, emphasizing the need for ongoing updates, trusted components, and effective privacy measures to protect against unauthorized access and vulnerabilities.
Hackers can wirelessly watch your screen via HDMI radiation
Researchers in Uruguay developed "Deep-TEMPEST," a technique using AI to wirelessly intercept HDMI video signals via electromagnetic radiation, raising security concerns for sensitive data protection against potential espionage.