I think the most dangerous thing is the direct memory access , cuz u only need 
some magic code and a computer with a psu or FireWire port

On October 17, 2017 1:46:43 PM GMT+02:00, Bryan Harris <bryanlhar...@gmail.com> 
wrote:
>Re: physical access, it seems not a technical problem.  I.e. keep
>laptop
>with you, hire a guard, etc.  I'm not very technical, but could the
>hash be
>stored in usb stick or online?
>
>Maybe construct yourself a "computer safe" to make it harder for people
>to
>get access while you're away?  I.e. increase the time/difficulty for
>them.
>
>On Tue, Oct 17, 2017 at 6:21 AM, flipchan <flipc...@riseup.net> wrote:
>
>> Hey I also run libreboot :)
>>
>> I have read research about signing all the components and then
>verifying
>> all that while you both , anyhow I think this would be very
>problematic
>> with the new karl implementation that has taken place in openbsd 6.2
>>
>> On October 14, 2017 4:26:21 PM GMT+02:00, "Bryan C. Everly" <
>> br...@bceassociates.com> wrote:
>> >Hi misc@,
>> >
>> >In playing around with Libreboot and Coreboot, my belief that
>physical
>> >access to the hardware really ups an attacker’s ability to win
>against
>> >most
>> >security has been massively reinforced.  For example, someone with
>> >enough
>> >practice could take my Thinkpad T500 apart, force flash the BIOS (as
>I
>> >have
>> >been doing), reassemble it and put it back on my desk in ten to
>fifteen
>> >minutes (or maybe faster). The payload they flash could easily
>include
>> >a
>> >root kit and keylogger which would mitigate the advantage of Full
>Disk
>> >Encryption (because they could grab your passphrase keystrokes and
>send
>> >them off to the mother ship). So my happy little bubble that FDE
>would
>> >give
>> >me protection against all but a brute force attack has been popped.
>> >
>> >Here’s my thought. What if we modified our boot code to do a hash of
>> >the
>> >BiOS and stored it persistently across boots?  Then we could compare
>it
>> >this time to the last value and take some action / issue some
>warning
>> >that
>> >something changed. It would be mildly annoying if you actually did
>just
>> >update your BIOS to a new version but that would be a small trade
>off
>> >in my
>> >mind at least.
>> >
>> >The sticking point is this - where do you store the previous hash? 
>If
>> >we
>> >stored it outside of the FDE container, the attacker could just
>rewrite
>> >it
>> >on boot and we wouldn’t be able to detect a change. Put it inside
>the
>> >FDE
>> >and you would have to type your passphrase (sending it to the
>attacker)
>> >to
>> >read it.
>> >
>> >So now to my ask - would a feature like this be of any interest to
>> >others?
>> >If so, any thoughts on how to securely persist the hash to solve the
>> >problem I describe above?
>> >
>> >Thanks for any and all feedback.
>> >
>> >--
>> >
>> >Thanks,
>> >Bryan
>>
>> --
>> Take Care Sincerely flipchan layerprox dev

-- 
Take Care Sincerely flipchan layerprox dev

Reply via email to