From 62f6c9d95fa1546bf5b3d65d8aa7da92e14c82ab Mon Sep 17 00:00:00 2001 From: Alyssa Rosenzweig Date: Fri, 17 Mar 2017 23:29:23 -0700 Subject: Squeeze blank --- docs/hardware/dock.md | 6 ------ docs/hardware/index.md | 2 -- docs/hardware/t60_heatsink.md | 8 -------- docs/hardware/t60_lcd_15.md | 4 ---- docs/hardware/t60_security.md | 26 -------------------------- docs/hardware/x60_heatsink.md | 11 ----------- docs/hardware/x60_keyboard.md | 4 ---- docs/hardware/x60_lcd_change.md | 4 ---- docs/hardware/x60_security.md | 23 ----------------------- 9 files changed, 88 deletions(-) (limited to 'docs/hardware') diff --git a/docs/hardware/dock.md b/docs/hardware/dock.md index 4a42a90b..fe64eea5 100644 --- a/docs/hardware/dock.md +++ b/docs/hardware/dock.md @@ -2,9 +2,6 @@ Notes about DMA and the docking station (X60/T60) ================================================= - - - Use case: --------- Usually when people do full disk encryption, it's not really full disk, @@ -66,7 +63,6 @@ Notes about DMA and the docking station (X60/T60) | ICH7 | |_______________________| - The code: --------- Now if I look at the existing code, there is some superio drivers, like @@ -121,8 +117,6 @@ Notes about DMA and the docking station (X60/T60) > The dock autodetection is tried only if it is also enabled > trough nvram. - - Copyright © 2014, 2015 Leah Rowe Permission is granted to copy, distribute and/or modify this document diff --git a/docs/hardware/index.md b/docs/hardware/index.md index c27ab465..24a61094 100644 --- a/docs/hardware/index.md +++ b/docs/hardware/index.md @@ -16,8 +16,6 @@ This section relates to hardware maintenance on supported targets. - [ThinkPad X60/X60S: hardware security](x60_security.html) - [ThinkPad T60: hardware security](t60_security.html) - - Copyright © 2014, 2015 Leah Rowe Permission is granted to copy, distribute and/or modify this document diff --git a/docs/hardware/t60_heatsink.md b/docs/hardware/t60_heatsink.md index a2fcd914..97f88cb2 100644 --- a/docs/hardware/t60_heatsink.md +++ b/docs/hardware/t60_heatsink.md @@ -6,8 +6,6 @@ Using this guide you can also change/upgrade the CPU. [Back to previous index](./) - - Hardware requirements {#hardware_requirements} ===================== @@ -15,16 +13,12 @@ Hardware requirements {#hardware_requirements} changing CPU heatsink (procedure involves removing heatsink) - thermal compound/paste (Arctic MX-4 is good. Others are also good.) - - Software requirements {#software_requirements} ===================== - xsensors - stress - - Disassembly {#recovery} =========== @@ -96,8 +90,6 @@ replacing cpu paste/heatsink: ![](../images/t60_dev/0074.JPG) - - Copyright © 2014, 2015 Leah Rowe Permission is granted to copy, distribute and/or modify this document diff --git a/docs/hardware/t60_lcd_15.md b/docs/hardware/t60_lcd_15.md index 7aacf0e0..1a302460 100644 --- a/docs/hardware/t60_lcd_15.md +++ b/docs/hardware/t60_lcd_15.md @@ -8,8 +8,6 @@ the procedure is a bit more involved than on 15.1". [Back to previous index](./) - - Disassembly {#recovery} =========== @@ -56,8 +54,6 @@ It lives! ![](../images/t60_dev/0071.JPG) ![](../images/t60_dev/0072.JPG) ![](../images/t60_dev/0073.JPG) - - Copyright © 2014, 2015 Leah Rowe Permission is granted to copy, distribute and/or modify this document diff --git a/docs/hardware/t60_security.md b/docs/hardware/t60_security.md index 9eb8ed7c..9b35184a 100644 --- a/docs/hardware/t60_security.md +++ b/docs/hardware/t60_security.md @@ -7,8 +7,6 @@ tutorial is **incomplete** at the time of writing. [Back to previous index](./) - - Table of Contents ================= @@ -30,8 +28,6 @@ Software requirements {#software_requirements} - none (at least in the scope of the article as-is) - You probably want to encrypt your GNU+Linux install using LUKS - - Rationale ========= @@ -43,8 +39,6 @@ memory access that could communicate with inputs/outputs that could be used to remotely command the system (or leak data). All of this is purely theoretical for the time being. - - Disassembly {#procedure} =========== @@ -273,8 +267,6 @@ replacing cpu paste/heatsink: ![](../images/t60_dev/0074.JPG) - - Not covered yet: ---------------- @@ -293,8 +285,6 @@ or directly to the video: A lot of this tutorial is based on that video. Look towards the second half of the video to see how to do the above. - - Also not covered yet: --------------------- @@ -316,8 +306,6 @@ Also not covered yet: - - https://gitorious.org/gnutoo-for-coreboot/grub-assemble/source/a61f636797777a742f65f4c9c58032aa6a9b23c3: - - Extra notes =========== @@ -335,7 +323,6 @@ with the help of an SDR and some directional antennas[\[3\]](#ref3). controller](http://www.coreboot.org/Intel_82573_Ethernet_controller) on the X60 seems safe, according to Denis. - Risk level ---------- @@ -346,9 +333,6 @@ Risk level - Speakers: only problematic if the computer gets compromised. - EC: can be mitigated if following the guide on software security. - - - Further reading material (software security) ============================================ @@ -358,12 +342,9 @@ Further reading material (software security) /boot)](../gnulinux/encrypted_parabola.html) - [Notes about DMA access and the docking station](dock.html) - - References ========== - \[1\] physical access {#ref1} --------------------- @@ -376,8 +357,6 @@ to 400000$, some other websites had prices 10 times lower but that but it was probably a typo. So if people increase their security it makes it more risky and more costly to attack people. - - \[2\] microphone {#ref2} ---------------- @@ -388,8 +367,6 @@ microphone jack can now become a headphone plug, that's called retasking. There is some support for it in GNU+Linux but it's not very well known. - - \[3\] Video (CCC) {#ref3} ----------------- @@ -398,9 +375,6 @@ their demo is experimental(their hardware also got damaged during the transport), the spies probably already have that since a long time. - - - Copyright © 2014, 2015 Leah Rowe Permission is granted to copy, distribute and/or modify this document diff --git a/docs/hardware/x60_heatsink.md b/docs/hardware/x60_heatsink.md index d7c4562d..47cb9d10 100644 --- a/docs/hardware/x60_heatsink.md +++ b/docs/hardware/x60_heatsink.md @@ -5,9 +5,6 @@ Changing the fan/heatsink on the ThinkPad X60 This guide will teach you how to replace the fan and heatsink on your ThinkPad X60. - - - Table of Contents ================= @@ -15,8 +12,6 @@ Table of Contents - [Software Requirements](#software_requirements) - [Disassembly](#procedure) - - Hardware requirements {#hardware_requirements} ===================== @@ -26,16 +21,12 @@ Hardware requirements {#hardware_requirements} 'ok') - Something to spread the paste with - - Software requirements (for CPU stress testing) {#software_requirements} ============================================== - xsensors utility - stress utility - - Disassembly {#procedure} =========== @@ -124,8 +115,6 @@ the heatsink, reversing previous steps. **xsensors** (or **watch sensors** command) can be used to monitor heat. Below 90C is ok. - - Copyright © 2014, 2015 Leah Rowe Permission is granted to copy, distribute and/or modify this document diff --git a/docs/hardware/x60_keyboard.md b/docs/hardware/x60_keyboard.md index b45c3f5d..61cf1084 100644 --- a/docs/hardware/x60_keyboard.md +++ b/docs/hardware/x60_keyboard.md @@ -11,8 +11,6 @@ same place, and it's the same procedure. [Back to previous index](./) - - Just follow these steps, and then reverse {#recovery} ========================================= @@ -26,8 +24,6 @@ Just follow these steps, and then reverse {#recovery} ![](../images/x60_keyboard/5.JPG) - - Copyright © 2014, 2015 Leah Rowe Permission is granted to copy, distribute and/or modify this document diff --git a/docs/hardware/x60_lcd_change.md b/docs/hardware/x60_lcd_change.md index 05270f77..21baedf2 100644 --- a/docs/hardware/x60_lcd_change.md +++ b/docs/hardware/x60_lcd_change.md @@ -6,8 +6,6 @@ This tutorial is incomplete, and only pictures for now. [Back to previous index](./) - - ![](../images/x60_lcd_change/0001.JPG) ![](../images/x60_lcd_change/0002.JPG) ![](../images/x60_lcd_change/0003.JPG) @@ -16,8 +14,6 @@ This tutorial is incomplete, and only pictures for now. ![](../images/x60_lcd_change/0006.JPG) ![](../images/x60_lcd_change/0007.JPG) - - Copyright © 2014, 2015 Leah Rowe Permission is granted to copy, distribute and/or modify this document diff --git a/docs/hardware/x60_security.md b/docs/hardware/x60_security.md index b5131127..307bb77d 100644 --- a/docs/hardware/x60_security.md +++ b/docs/hardware/x60_security.md @@ -7,8 +7,6 @@ tutorial is **incomplete** at the time of writing. [Back to previous index](./) - - Table of Contents ================= @@ -16,8 +14,6 @@ Table of Contents - [Software Requirements](#software_requirements) - [The procedure](#procedure) - - Hardware requirements {#hardware_requirements} ===================== @@ -31,8 +27,6 @@ Software requirements {#software_requirements} - none (at least in the scope of the article as-is) - You probably want to encrypt your GNU+Linux install using LUKS - - Rationale ========= @@ -59,7 +53,6 @@ module is on the left (easily removable): ![](../images/x60_security/0000_bluetooth.jpg) - If your model was WWAN, remove the simcard (check anyway): Uncover those 2 screws at the bottom: @@ -205,8 +198,6 @@ Also not covered yet: - - https://gitorious.org/gnutoo-for-coreboot/grub-assemble/source/a61f636797777a742f65f4c9c58032aa6a9b23c3: - - Extra notes =========== @@ -224,7 +215,6 @@ with the help of an SDR and some directional antennas[\[3\]](#ref3). controller](http://www.coreboot.org/Intel_82573_Ethernet_controller) on the X60 seems safe, according to Denis. - Risk level ---------- @@ -235,9 +225,6 @@ Risk level - Speakers: only problematic if the computer gets compromised. - EC: can be mitigated if following the guide on software security. - - - Further reading material (software security) ============================================ @@ -247,12 +234,9 @@ Further reading material (software security) /boot)](../gnulinux/encrypted_parabola.html) - [Notes about DMA access and the docking station](dock.html) - - References ========== - \[1\] physical access {#ref1} --------------------- @@ -265,8 +249,6 @@ to 400000$, some other websites had prices 10 times lower but that but it was probably a typo. So if people increase their security it makes it more risky and more costly to attack people. - - \[2\] microphone {#ref2} ---------------- @@ -277,8 +259,6 @@ microphone jack can now become a headphone plug, that's called retasking. There is some support for it in GNU+Linux but it's not very well known. - - \[3\] Video (CCC) {#ref3} ----------------- @@ -287,9 +267,6 @@ their demo is experimental(their hardware also got damaged during the transport), the spies probably already have that since a long time. - - - Copyright © 2014, 2015 Leah Rowe Permission is granted to copy, distribute and/or modify this document -- cgit v1.2.3-70-g09d2