You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thanks for the great list! May I suggest adding a new Hardware section to defend against physical attacks (eg theft of a machine with encrypted data) that powers-off the machine or triggers wipe of encryption keys?
Here's two open-source hardware projects for tripwires/dead-man-switches
The following guide describes how BusKill can be configured to wipe the LUKS Header (containing the FDE key) and its metadata. It shows a video demo where the machine wiped the keys & powered-off in <6 seconds, and it includes a post-execution forensic analysis in Kali with bulk_extractor
Thanks for the great list! May I suggest adding a new
Hardware
section to defend against physical attacks (eg theft of a machine with encrypted data) that powers-off the machine or triggers wipe of encryption keys?Here's two open-source hardware projects for tripwires/dead-man-switches
The following guide describes how BusKill can be configured to wipe the LUKS Header (containing the FDE key) and its metadata. It shows a video demo where the machine wiped the keys & powered-off in <6 seconds, and it includes a post-execution forensic analysis in Kali with bulk_extractor
The text was updated successfully, but these errors were encountered: