Skip to main content

Questions tagged [hardware]

For attacks against, or best practices for physical components of an Information Technology system. It can consist of network equipment, servers, CPUs, hardware security module, smartcards, etc. When using this tag, also include an additional tag for the specific type of hardware.

3votes
4answers
1kviews

Unidirectional File Transfer (write only) Using Serial Adapter?

Building on This question -- I similarly want implement write-only transfer from an air gapped machine. I noticed there are various serial-to-usb adapters available also. What I'm wondering is, would ...
bigcodeszzer's user avatar
2votes
1answer
143views

Is there any reasonable justification to be concerned with hardware-based "AI" processors?

Google Tensor is one example of a chip being designed around "AI" features, though it is not the only such chip. While these technologies are being placed on consumer devices, consumer-...
Paul's user avatar
  • 171
11votes
3answers
2kviews

Why might RDRAND not be safe to use when the rest of the system is?

In Linux, the RDRAND instruction is used, but taken with a grain of salt, in that it is used as only one of several sources of entropy for a CSPRNG. It is used in this way over concerns that the ...
TheHans255's user avatar
1vote
0answers
33views

What is the difference between Root of Trust and Trusted Computing Base (TCB)? [duplicate]

RoT: element within a system that is trusted and must always behave as expected because any misbehavior cannot be detected at runtime. It's part of the TCB. TCB: the smallest set of hardware, ...
allexj's user avatar
0votes
0answers
40views

theoretical approach to executing code on a WiFi card through electrical fault means [duplicate]

Is it possible to for example send a malformed electromagnetic signal that is disguised as a regular network packet so that when it passes through multiple circuits and gets converted back into ...
HardwareNewb's user avatar
3votes
0answers
57views

Are there any commercially available (or not) hardware keylogger chip that someone could solder/plug to a phones LCD?

Title says it all. Are there any keylogger chips for phone LCDs?
Gary Oak's user avatar
1vote
1answer
188views

Is there an equivalent to passkeys but to prevent cookie stealing?

Passkeys prevent phishing, no one can make you login remotely (without exploits) and if they are hardware based and never leave the hardware, them even exploits might have a hard time getting them. ...
Gatonito's user avatar
2votes
0answers
69views

How to recycle dead Google Pixel laptop?

I have old Google Pixel laptop that is not working anymore. I cannot charge it and it would not start. I have a number of apps installed there, linked to my current account (for example, social media ...
JoeBloggs's user avatar
1vote
0answers
27views

"PUF CRPs authentication requires trust in manufacturer since it's him who performs the storage of CRPs"....?

"PUF CRPs authentication requires trust in manufacturer since it's him who performs the storage of CRPs". So does it mean that we have to trust manufacturer, because he could replace the ...
allexj's user avatar
1vote
0answers
51views

Laser pulse/injection attacks, Xray inspection, Test-based(like JTAG scan chain) attacks, Microprobing attacks... are these invasive or non-invasive?

Laser pulse/injection attacks, Xray inspection, Test-based(like JTAG scan chain) attacks, Microprobing attacks... are these invasive or non-invasive? Just curiosity. I don't know how to categorize. My ...
allexj's user avatar
1vote
0answers
51views

Is PUF Challenge-Response Authentication applied on every power-up event? [closed]

Are PUFs used, EVERY time we power on the computer to verify that nothing has been tampered with (by using CRP authentication)? Which element performs this authentication? (bios, secureboot, I don't ...
allexj's user avatar
2votes
1answer
177views

How to update BIOS before BIOS infected Host reinfects BIOS?

I learned about the BIOS being able to be written to by malware. It reminded me I have a used laptop that performs noticeably slower than any comparable devices, so I went ahead an downloaded BIOS ...
I like to code's user avatar
1vote
1answer
98views

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key?

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop ...
allexj's user avatar
0votes
1answer
254views

Salvageable computer parts after being hacked [duplicate]

(edited) My question main is much pretty where can malware hide after it's infected your computer and what parts should I keep and throw away to make sure the infection no longer spreads. Does factory ...
Weissman's user avatar
15votes
7answers
5kviews

Choosing laptop brand for company

Recently we have been wondering whether it makes a difference (from a security and privacy perspective) what brand laptops should be used in our company. I have heard wild stories about backdoors ...
rgedn's user avatar

153050per page
close