aboutsummaryrefslogtreecommitdiff
path: root/docs/hardware/t60_security.md
diff options
context:
space:
mode:
authorLeah Rowe <info@minifree.org>2017-04-04 00:39:08 +0200
committerGogs <gogitservice@gmail.com>2017-04-04 00:39:08 +0200
commitc7908aa7fe8e7cc9b00409bd7c93c58c0e6d1261 (patch)
tree9c76f68bc63b7a9fed0c22e4ffdcc2f14be0ee69 /docs/hardware/t60_security.md
parent3d08f096b8ff9857fc066e15d318dcf145807343 (diff)
parentcb8d13228f7dcb58f7e891dfd57493209ecc5518 (diff)
downloadlibrebootfr-c7908aa7fe8e7cc9b00409bd7c93c58c0e6d1261.tar.gz
librebootfr-c7908aa7fe8e7cc9b00409bd7c93c58c0e6d1261.zip
Merge branch 'www/template' of vimuser/libreboot into master
Diffstat (limited to 'docs/hardware/t60_security.md')
-rw-r--r--docs/hardware/t60_security.md26
1 files changed, 0 insertions, 26 deletions
diff --git a/docs/hardware/t60_security.md b/docs/hardware/t60_security.md
index 974f8b43..d4d66ca4 100644
--- a/docs/hardware/t60_security.md
+++ b/docs/hardware/t60_security.md
@@ -5,8 +5,6 @@ tutorial is **incomplete** at the time of writing.
[Back to previous index](./)
-
-
Table of Contents
=================
@@ -28,8 +26,6 @@ Software requirements {#software_requirements}
- none (at least in the scope of the article as-is)
- You probably want to encrypt your GNU+Linux install using LUKS
-
-
Rationale
=========
@@ -41,8 +37,6 @@ memory access that could communicate with inputs/outputs that could be
used to remotely command the system (or leak data). All of this is
purely theoretical for the time being.
-
-
Disassembly {#procedure}
===========
@@ -223,8 +217,6 @@ Always stress test ('stress -c 2' and xsensors. below 90C is ok) when
replacing cpu paste/heatsink:\
![](../images/t60_dev/0074.JPG)
-
-
Not covered yet:
----------------
@@ -244,8 +236,6 @@ or directly to the video:
A lot of this tutorial is based on that video. Look towards the second
half of the video to see how to do the above.
-
-
Also not covered yet:
---------------------
@@ -267,8 +257,6 @@ Also not covered yet:
- <https://en.wikipedia.org/wiki/Tempest_%28codename%29>
- https://gitorious.org/gnutoo-for-coreboot/grub-assemble/source/a61f636797777a742f65f4c9c58032aa6a9b23c3:
-
-
Extra notes
===========
@@ -286,7 +274,6 @@ with the help of an SDR and some directional antennas[\[3\]](#ref3).
controller](http://www.coreboot.org/Intel_82573_Ethernet_controller) on
the X60 seems safe, according to Denis.
-
Risk level
----------
@@ -297,9 +284,6 @@ Risk level
- Speakers: only problematic if the computer gets compromised.
- EC: can be mitigated if following the guide on software security.
-
-
-
Further reading material (software security)
============================================
@@ -309,12 +293,9 @@ Further reading material (software security)
/boot)](../gnulinux/encrypted_parabola.html)
- [Notes about DMA access and the docking station](dock.html)
-
-
References
==========
-
\[1\] physical access {#ref1}
---------------------
@@ -327,8 +308,6 @@ to 400000\$, some other websites had prices 10 times lower but that but
it was probably a typo. So if people increase their security it makes it
more risky and more costly to attack people.
-
-
\[2\] microphone {#ref2}
----------------
@@ -339,8 +318,6 @@ microphone jack can now become a headphone plug, that's called
retasking. There is some support for it in GNU+Linux but it's not very
well known.
-
-
\[3\] Video (CCC) {#ref3}
-----------------
@@ -349,9 +326,6 @@ their demo is experimental(their hardware also got damaged during the
transport), the spies probably already have that since a long time.
<http://berlin.ftp.media.ccc.de/congress/2013/webm/30c3-5356-en-Firmware_Fat_Camp_webm.webm>
-
-
-
Copyright © 2014, 2015 Leah Rowe <info@minifree.org>\
Permission is granted to copy, distribute and/or modify this document
under the terms of the Creative Commons Attribution-ShareAlike 4.0