diff options
Diffstat (limited to 'docs/hardware/t60_security.md')
-rw-r--r-- | docs/hardware/t60_security.md | 26 |
1 files changed, 0 insertions, 26 deletions
diff --git a/docs/hardware/t60_security.md b/docs/hardware/t60_security.md index 9eb8ed7c..9b35184a 100644 --- a/docs/hardware/t60_security.md +++ b/docs/hardware/t60_security.md @@ -7,8 +7,6 @@ tutorial is **incomplete** at the time of writing. [Back to previous index](./) - - Table of Contents ================= @@ -30,8 +28,6 @@ Software requirements {#software_requirements} - none (at least in the scope of the article as-is) - You probably want to encrypt your GNU+Linux install using LUKS - - Rationale ========= @@ -43,8 +39,6 @@ memory access that could communicate with inputs/outputs that could be used to remotely command the system (or leak data). All of this is purely theoretical for the time being. - - Disassembly {#procedure} =========== @@ -273,8 +267,6 @@ replacing cpu paste/heatsink: ![](../images/t60_dev/0074.JPG) - - Not covered yet: ---------------- @@ -293,8 +285,6 @@ or directly to the video: A lot of this tutorial is based on that video. Look towards the second half of the video to see how to do the above. - - Also not covered yet: --------------------- @@ -316,8 +306,6 @@ Also not covered yet: - <https://en.wikipedia.org/wiki/Tempest_%28codename%29> - https://gitorious.org/gnutoo-for-coreboot/grub-assemble/source/a61f636797777a742f65f4c9c58032aa6a9b23c3: - - Extra notes =========== @@ -335,7 +323,6 @@ with the help of an SDR and some directional antennas[\[3\]](#ref3). controller](http://www.coreboot.org/Intel_82573_Ethernet_controller) on the X60 seems safe, according to Denis. - Risk level ---------- @@ -346,9 +333,6 @@ Risk level - Speakers: only problematic if the computer gets compromised. - EC: can be mitigated if following the guide on software security. - - - Further reading material (software security) ============================================ @@ -358,12 +342,9 @@ Further reading material (software security) /boot)](../gnulinux/encrypted_parabola.html) - [Notes about DMA access and the docking station](dock.html) - - References ========== - \[1\] physical access {#ref1} --------------------- @@ -376,8 +357,6 @@ to 400000$, some other websites had prices 10 times lower but that but it was probably a typo. So if people increase their security it makes it more risky and more costly to attack people. - - \[2\] microphone {#ref2} ---------------- @@ -388,8 +367,6 @@ microphone jack can now become a headphone plug, that's called retasking. There is some support for it in GNU+Linux but it's not very well known. - - \[3\] Video (CCC) {#ref3} ----------------- @@ -398,9 +375,6 @@ their demo is experimental(their hardware also got damaged during the transport), the spies probably already have that since a long time. <http://berlin.ftp.media.ccc.de/congress/2013/webm/30c3-5356-en-Firmware_Fat_Camp_webm.webm> - - - Copyright © 2014, 2015 Leah Rowe <info@minifree.org> Permission is granted to copy, distribute and/or modify this document |