Questions tagged [hardware]
For attacks against, or best practices for physical components of an Information Technology system. It can consist of network equipment, servers, CPUs, hardware security module, smartcards, etc. When using this tag, also include an additional tag for the specific type of hardware.
595 questions
3votes
4answers
1kviews
Unidirectional File Transfer (write only) Using Serial Adapter?
Building on This question -- I similarly want implement write-only transfer from an air gapped machine. I noticed there are various serial-to-usb adapters available also. What I'm wondering is, would ...
2votes
1answer
143views
Is there any reasonable justification to be concerned with hardware-based "AI" processors?
Google Tensor is one example of a chip being designed around "AI" features, though it is not the only such chip. While these technologies are being placed on consumer devices, consumer-...
11votes
3answers
2kviews
Why might RDRAND not be safe to use when the rest of the system is?
In Linux, the RDRAND instruction is used, but taken with a grain of salt, in that it is used as only one of several sources of entropy for a CSPRNG. It is used in this way over concerns that the ...
1vote
0answers
33views
What is the difference between Root of Trust and Trusted Computing Base (TCB)? [duplicate]
RoT: element within a system that is trusted and must always behave as expected because any misbehavior cannot be detected at runtime. It's part of the TCB. TCB: the smallest set of hardware, ...
0votes
0answers
40views
theoretical approach to executing code on a WiFi card through electrical fault means [duplicate]
Is it possible to for example send a malformed electromagnetic signal that is disguised as a regular network packet so that when it passes through multiple circuits and gets converted back into ...
3votes
0answers
57views
Are there any commercially available (or not) hardware keylogger chip that someone could solder/plug to a phones LCD?
Title says it all. Are there any keylogger chips for phone LCDs?
1vote
1answer
188views
Is there an equivalent to passkeys but to prevent cookie stealing?
Passkeys prevent phishing, no one can make you login remotely (without exploits) and if they are hardware based and never leave the hardware, them even exploits might have a hard time getting them. ...
2votes
0answers
69views
How to recycle dead Google Pixel laptop?
I have old Google Pixel laptop that is not working anymore. I cannot charge it and it would not start. I have a number of apps installed there, linked to my current account (for example, social media ...
1vote
0answers
27views
"PUF CRPs authentication requires trust in manufacturer since it's him who performs the storage of CRPs"....?
"PUF CRPs authentication requires trust in manufacturer since it's him who performs the storage of CRPs". So does it mean that we have to trust manufacturer, because he could replace the ...
1vote
0answers
51views
Laser pulse/injection attacks, Xray inspection, Test-based(like JTAG scan chain) attacks, Microprobing attacks... are these invasive or non-invasive?
Laser pulse/injection attacks, Xray inspection, Test-based(like JTAG scan chain) attacks, Microprobing attacks... are these invasive or non-invasive? Just curiosity. I don't know how to categorize. My ...
1vote
0answers
51views
Is PUF Challenge-Response Authentication applied on every power-up event? [closed]
Are PUFs used, EVERY time we power on the computer to verify that nothing has been tampered with (by using CRP authentication)? Which element performs this authentication? (bios, secureboot, I don't ...
2votes
1answer
177views
How to update BIOS before BIOS infected Host reinfects BIOS?
I learned about the BIOS being able to be written to by malware. It reminded me I have a used laptop that performs noticeably slower than any comparable devices, so I went ahead an downloaded BIOS ...
1vote
1answer
98views
Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key?
Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop ...
0votes
1answer
254views
Salvageable computer parts after being hacked [duplicate]
(edited) My question main is much pretty where can malware hide after it's infected your computer and what parts should I keep and throw away to make sure the infection no longer spreads. Does factory ...
15votes
7answers
5kviews
Choosing laptop brand for company
Recently we have been wondering whether it makes a difference (from a security and privacy perspective) what brand laptops should be used in our company. I have heard wild stories about backdoors ...