Jump to content

"Evil maid" attack (and defense)


Iain
 Share

Recommended Posts

I just came across an entry on Bruce Schneier's blog about the "evil maid" attack. Here's the link. He mentions that a defence is to boot from USB and hash the bootloader to see if it's been changed. The attack's fairly new so I don't know if anyone's set about creating something which can be used to defend against the attack.

This has got me thinking and I just wanted to share!

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...