aboutsummaryrefslogtreecommitdiff
path: root/docs/hardware/t60_security.md
diff options
context:
space:
mode:
Diffstat (limited to 'docs/hardware/t60_security.md')
-rw-r--r--docs/hardware/t60_security.md26
1 files changed, 0 insertions, 26 deletions
diff --git a/docs/hardware/t60_security.md b/docs/hardware/t60_security.md
index 9eb8ed7c..9b35184a 100644
--- a/docs/hardware/t60_security.md
+++ b/docs/hardware/t60_security.md
@@ -7,8 +7,6 @@ tutorial is **incomplete** at the time of writing.
[Back to previous index](./)
-
-
Table of Contents
=================
@@ -30,8 +28,6 @@ Software requirements {#software_requirements}
- none (at least in the scope of the article as-is)
- You probably want to encrypt your GNU+Linux install using LUKS
-
-
Rationale
=========
@@ -43,8 +39,6 @@ memory access that could communicate with inputs/outputs that could be
used to remotely command the system (or leak data). All of this is
purely theoretical for the time being.
-
-
Disassembly {#procedure}
===========
@@ -273,8 +267,6 @@ replacing cpu paste/heatsink:
![](../images/t60_dev/0074.JPG)
-
-
Not covered yet:
----------------
@@ -293,8 +285,6 @@ or directly to the video:
A lot of this tutorial is based on that video. Look towards the second
half of the video to see how to do the above.
-
-
Also not covered yet:
---------------------
@@ -316,8 +306,6 @@ Also not covered yet:
- <https://en.wikipedia.org/wiki/Tempest_%28codename%29>
- https://gitorious.org/gnutoo-for-coreboot/grub-assemble/source/a61f636797777a742f65f4c9c58032aa6a9b23c3:
-
-
Extra notes
===========
@@ -335,7 +323,6 @@ with the help of an SDR and some directional antennas[\[3\]](#ref3).
controller](http://www.coreboot.org/Intel_82573_Ethernet_controller) on
the X60 seems safe, according to Denis.
-
Risk level
----------
@@ -346,9 +333,6 @@ Risk level
- Speakers: only problematic if the computer gets compromised.
- EC: can be mitigated if following the guide on software security.
-
-
-
Further reading material (software security)
============================================
@@ -358,12 +342,9 @@ Further reading material (software security)
/boot)](../gnulinux/encrypted_parabola.html)
- [Notes about DMA access and the docking station](dock.html)
-
-
References
==========
-
\[1\] physical access {#ref1}
---------------------
@@ -376,8 +357,6 @@ to 400000$, some other websites had prices 10 times lower but that but
it was probably a typo. So if people increase their security it makes it
more risky and more costly to attack people.
-
-
\[2\] microphone {#ref2}
----------------
@@ -388,8 +367,6 @@ microphone jack can now become a headphone plug, that's called
retasking. There is some support for it in GNU+Linux but it's not very
well known.
-
-
\[3\] Video (CCC) {#ref3}
-----------------
@@ -398,9 +375,6 @@ their demo is experimental(their hardware also got damaged during the
transport), the spies probably already have that since a long time.
<http://berlin.ftp.media.ccc.de/congress/2013/webm/30c3-5356-en-Firmware_Fat_Camp_webm.webm>
-
-
-
Copyright © 2014, 2015 Leah Rowe <info@minifree.org>
Permission is granted to copy, distribute and/or modify this document