diff options
author | Leah Rowe <info@minifree.org> | 2017-04-04 00:39:08 +0200 |
---|---|---|
committer | Gogs <gogitservice@gmail.com> | 2017-04-04 00:39:08 +0200 |
commit | c7908aa7fe8e7cc9b00409bd7c93c58c0e6d1261 (patch) | |
tree | 9c76f68bc63b7a9fed0c22e4ffdcc2f14be0ee69 /docs/hardware/t60_security.md | |
parent | 3d08f096b8ff9857fc066e15d318dcf145807343 (diff) | |
parent | cb8d13228f7dcb58f7e891dfd57493209ecc5518 (diff) | |
download | librebootfr-c7908aa7fe8e7cc9b00409bd7c93c58c0e6d1261.tar.gz librebootfr-c7908aa7fe8e7cc9b00409bd7c93c58c0e6d1261.zip |
Merge branch 'www/template' of vimuser/libreboot into master
Diffstat (limited to 'docs/hardware/t60_security.md')
-rw-r--r-- | docs/hardware/t60_security.md | 26 |
1 files changed, 0 insertions, 26 deletions
diff --git a/docs/hardware/t60_security.md b/docs/hardware/t60_security.md index 974f8b43..d4d66ca4 100644 --- a/docs/hardware/t60_security.md +++ b/docs/hardware/t60_security.md @@ -5,8 +5,6 @@ tutorial is **incomplete** at the time of writing. [Back to previous index](./) - - Table of Contents ================= @@ -28,8 +26,6 @@ Software requirements {#software_requirements} - none (at least in the scope of the article as-is) - You probably want to encrypt your GNU+Linux install using LUKS - - Rationale ========= @@ -41,8 +37,6 @@ memory access that could communicate with inputs/outputs that could be used to remotely command the system (or leak data). All of this is purely theoretical for the time being. - - Disassembly {#procedure} =========== @@ -223,8 +217,6 @@ Always stress test ('stress -c 2' and xsensors. below 90C is ok) when replacing cpu paste/heatsink:\ ![](../images/t60_dev/0074.JPG) - - Not covered yet: ---------------- @@ -244,8 +236,6 @@ or directly to the video: A lot of this tutorial is based on that video. Look towards the second half of the video to see how to do the above. - - Also not covered yet: --------------------- @@ -267,8 +257,6 @@ Also not covered yet: - <https://en.wikipedia.org/wiki/Tempest_%28codename%29> - https://gitorious.org/gnutoo-for-coreboot/grub-assemble/source/a61f636797777a742f65f4c9c58032aa6a9b23c3: - - Extra notes =========== @@ -286,7 +274,6 @@ with the help of an SDR and some directional antennas[\[3\]](#ref3). controller](http://www.coreboot.org/Intel_82573_Ethernet_controller) on the X60 seems safe, according to Denis. - Risk level ---------- @@ -297,9 +284,6 @@ Risk level - Speakers: only problematic if the computer gets compromised. - EC: can be mitigated if following the guide on software security. - - - Further reading material (software security) ============================================ @@ -309,12 +293,9 @@ Further reading material (software security) /boot)](../gnulinux/encrypted_parabola.html) - [Notes about DMA access and the docking station](dock.html) - - References ========== - \[1\] physical access {#ref1} --------------------- @@ -327,8 +308,6 @@ to 400000\$, some other websites had prices 10 times lower but that but it was probably a typo. So if people increase their security it makes it more risky and more costly to attack people. - - \[2\] microphone {#ref2} ---------------- @@ -339,8 +318,6 @@ microphone jack can now become a headphone plug, that's called retasking. There is some support for it in GNU+Linux but it's not very well known. - - \[3\] Video (CCC) {#ref3} ----------------- @@ -349,9 +326,6 @@ their demo is experimental(their hardware also got damaged during the transport), the spies probably already have that since a long time. <http://berlin.ftp.media.ccc.de/congress/2013/webm/30c3-5356-en-Firmware_Fat_Camp_webm.webm> - - - Copyright © 2014, 2015 Leah Rowe <info@minifree.org>\ Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 4.0 |