Iain Posted October 24, 2009 Share Posted October 24, 2009 I just came across an entry on Bruce Schneier's blog about the "evil maid" attack. Here's the link. He mentions that a defence is to boot from USB and hash the bootloader to see if it's been changed. The attack's fairly new so I don't know if anyone's set about creating something which can be used to defend against the attack. This has got me thinking and I just wanted to share! Quote Link to comment Share on other sites More sharing options...
P@c_M@n Posted October 25, 2009 Share Posted October 25, 2009 Another reason not to let anyone other than you have physical access to your computer. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.