this post was submitted on 11 Oct 2024
39 points (100.0% liked)

Technology

1569 readers
387 users here now

Which posts fit here?

Anything that is at least tangentially connected to the technology, social media platforms, informational technologies and tech policy.


Rules

1. English onlyTitle and associated content has to be in English.
2. Use original linkPost URL should be the original link to the article (even if paywalled) and archived copies left in the body. It allows avoiding duplicate posts when cross-posting.
3. Respectful communicationAll communication has to be respectful of differing opinions, viewpoints, and experiences.
4. InclusivityEveryone is welcome here regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, education, socio-economic status, nationality, personal appearance, race, caste, color, religion, or sexual identity and orientation.
5. Ad hominem attacksAny kind of personal attacks are expressly forbidden. If you can't argue your position without attacking a person's character, you already lost the argument.
6. Off-topic tangentsStay on topic. Keep it relevant.
7. Instance rules may applyIf something is not covered by community rules, but are against lemmy.zip instance rules, they will be enforced.


Companion communities

[email protected]
[email protected]


Icon attribution | Banner attribution

founded 1 year ago
MODERATORS
 

Buchanan walks through his process of experimenting with low-cost fault-injection attacks as an alternative when typical software bugs aren't available to exploit.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 16 points 2 months ago (1 children)

That is impressive. However, if you have physical access to the RAM, you can probably also just pop in a live USB, chroot into the system and do whatever you want. Regardless, this injection was interesting and impressive. Hats off to a clever hacker like that.

[–] BrikoX 15 points 2 months ago* (last edited 2 months ago) (4 children)

Yeah, it's wild to me that desktop operating systems don't encrypt storage by default. Both iOS and Android do.

[–] [email protected] 8 points 2 months ago

The threat profile for a desktop is different than a phone.

You carry your phone with you everywhere.

Desktops typically stay in one location that likely has locks.

If you're truly paranoid, you'll encrypt your drive regardless. For regular joes like me, it's not enough for me to enable it and enter a password at boot up.

[–] [email protected] 6 points 2 months ago* (last edited 2 months ago) (2 children)

I'd guess it's because encryption adds overhead and slows things down. It's also overkill for most people's needs, since the chance to get their PC stolen isn't worth the performance impact

Should definitely be default on Laptops though

[–] [email protected] 2 points 2 months ago

For Apple computers with a T2 chip encryption actually is on by default and is always enabled at the hardware level. However, enabling filevault adds additional security around the master encryption key.

Perhaps a future TPM standard will support dedicated encryption throughput in the future instead of just RNG and key generation, but until that happens I can’t see computer manufacturers turning encryption on by default (especially because the bitlocker user experience for non-power users is still pretty awful)

On that note, being able to use TPM / UEFI features is getting more difficult for open source users, so actually taking advantage of the security hardware on your machine requires more work: https://github.com/Foxboron/sbctl/issues/85

[–] [email protected] 2 points 2 months ago

The overhead is negligible since modern desktop CPUs have included AES hardware acceleration for a long time by now

[–] [email protected] 4 points 2 months ago (2 children)

I chose to not encrypt my SSDs as I don't want to forget the password and lose all my data. But now I have an external backup I'm fine encrypting them.

[–] [email protected] 3 points 2 months ago

I would love to see something like macOS's FileVault encryption. It completely blends in with the login screen and your decryption password is your user password.

[–] BrikoX 0 points 2 months ago (1 children)

Use a password manager. And create a passphrase type password for it so it's easier to remember. Then you will have a unique password for everything, while only needing to remember one of them. And since you will use it daily, it's impossible to forget.

[–] [email protected] 3 points 2 months ago

I do use a password manager, but I can't use it for signing into a machine, just signing into other things once I'm already logged in. I usually do remember my password, but there was an incident when I changed my password because I thought someone had guessed it, and then forgot what I had changed it to and was only able to recover my data because my SSDs were not encrypted

[–] [email protected] 3 points 2 months ago

Windows 11’s behavior has changed so Bitlocker is generally enabled at install/upgrade provided you use a Microsoft account vs local account. Source