Comment by gorgoiler

Comment by gorgoiler 5 days ago

2 replies

I’d much rather have tamper detection. Encryption is great should the device is stolen but it feels like the wrong tool for defending against evil maids. All I’d want is that any time you open the case or touch the cold external ports (ie unbolted) you have to re-authenticate with a master password. I’m happy to use cabled peripherals to achieve this.

Chaining trust from POST to login feels like trying to make a theoretically perfect diamond and titanium bicycle that never wears down or falls apart when all I need is an automated system to tell me when to replace a part that’s about to fail.

nextaccountic 5 days ago

Encryption is just a baseline. Nobody should have unencrypted personal computers.

You can have both full disk encryption AND a tamper protection!

  • gorgoiler 5 days ago

    Sorry, I wasn’t clear enough. We’re talking about three things here:

    (1) Encryption: fast and fantastic, and a must-have for at-rest data protection.

    It is vulnerable to password theft though. An attacker might insert evil code between power-on and disk-password-entry. With a locked down BIOS / UEFI, the only way to insert the code is to take the boot drive out of the device, modify it, put it back, and hope no one notices. “Noticing” in this case is done by either:

    (2) Trust chaining: verify the signatures of the entire boot process to detect evil code.

    (3) Tamper detection: verify the physical integrity of the device.

    My point is that (1) is a given, and out of (2) or (3), I’d rather have the latter than deal with the shoddiness of the former