qubes update, pdf macro, last edited macro

This commit is contained in:
anarsec 2023-07-08 17:35:15 +00:00
parent 27cbe3f4fd
commit 0dc607247e
No known key found for this signature in database
14 changed files with 38 additions and 18 deletions

View file

@ -9,6 +9,7 @@ tags = ["opsec", "easy"]
[extra]
blogimage="/images/X230.jpg"
toc=true
dateedit=2023-05-10
+++
If police can ever have [physical access](https://www.csrc.link/threat-library/techniques/targeted-digital-surveillance/physical-access.html) to an electronic device like a laptop, even [for five minutes](https://www.vice.com/en/article/a3q374/hacker-bios-firmware-backdoor-evil-maid-attack-laptop-5-minutes), they can install hardware keyloggers, create images of the storage media, or otherwise trivially compromise it on the hardware, firmware, or software level. One way to minimize this risk is to make it tamper-evident. As the CSRC Threat Library [notes](https://www.csrc.link/threat-library/mitigations/tamper-evident-preparation.html), "Tamper-evident preparation will make it possible to discern when something has been [physically accessed](/glossary/#physical-attacks) - it's not possible to prevent a powerful enemy from obtaining physical access to your computer when you are away, but it should be possible to be able to detect when they do."