158
you are viewing a single comment's thread
view the rest of the comments
[-] blackstrat@lemmy.fwgx.uk 65 points 3 months ago

Building genuinely secure computer systems is incredibly difficult. You might even be in systems/software and be thinking "yeah it is hard", but to be really secure it's 1000x harder than that. So everything you use off the shelf from any vendor is a massive compromise and has holes in it. But on the other hand most people don't need really secure systems.

[-] Adalast@lemmy.world 16 points 3 months ago

Isn't a true air gap pretty solid though? Aside from someone actually coming into your house and interfacing directly it would be pretty hard to bypass, or am I on Mt. Dunning-Kruger over here this time?

[-] MajorHavoc@programming.dev 16 points 3 months ago* (last edited 3 months ago)

You are correct.

The uncomfortable part is what I've learned about the challenges to gain physical access.

Most physical security is equally appalling to most Cybersecurity.

Edit: Incredibly unfun exercise: pick a physical security device you rely on, personally, and do a YouTube search for "device name break in test". I've rarely been able to find a video more than 3 minutes long, for any product, at all. And the actual breaking is usually mere seconds in the middle bit.

[-] then_three_more@lemmy.world 16 points 3 months ago

The lockpicking lawyer scares me.

[-] bionicjoey@lemmy.ca 16 points 3 months ago

Imagine you wake up in the night, you hear your front door rattling. Someone is trying to break in. "No problem" you think to yourself, "I have a good lock on my front door". Then you hear the five most terrifying words you could possibly hear in that moment:

"This is the Lockpicking Lawyer"

[-] hperrin@lemmy.world 13 points 3 months ago

Most online services would struggle to provide their service to their users if all of their servers were air gapped.

[-] communism@lemmy.ml 6 points 3 months ago

Aside from someone actually coming into your house and interfacing directly

If any state entity is in your threat model then this would be major concern. If you're of any interest to the state, first thing they'll do is raid your home and seize your electronics. Your threat model shouldn't depend on assuming an attacker can't physically access your device (I know you never said an air gap should be the only defence, I'm just saying in general).

[-] blackstrat@lemmy.fwgx.uk 6 points 3 months ago

Air gap is a useful strategy. But what is that system? You don't really know anything about its origin or what any of its processors actually do. You know really nothing about any of the firmware or software you run on it. Just getting software on to it securely is a huge challenge to prove its origin and the whole supply chain. And then getting data out is a whole other problem. A general purpose computer is not a great choice if you want the best in security. And having it just in your house isn't that secure. Obviously as I say, most people don't need the best security.

[-] Valmond@lemmy.world 1 points 3 months ago

Yeah just think about BIOS and drivers, and again some vulnerability in SSH...

this post was submitted on 11 Jul 2024
158 points (100.0% liked)

Asklemmy

43791 readers
733 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy ๐Ÿ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS