A Presence-sensing Drive For Securely Storing Secrets
-
This post did not contain any content.
-
This post did not contain any content.
Wait, desoldering a chip and dumping contents makes an attacker “resourceful”? A sub-$50 hot air rework station (or $330-ish if you don’t want one that’ll burn your house down) and a $50 programming cable is … not a lot of resources.
-
This post did not contain any content.
Kinda cool idea;; but the key can't be rewritten; so if something happens to your phone; it would be bricked.
So... not really that great??
-
Wait, desoldering a chip and dumping contents makes an attacker “resourceful”? A sub-$50 hot air rework station (or $330-ish if you don’t want one that’ll burn your house down) and a $50 programming cable is … not a lot of resources.
Bro most people can barely heat up pizza rolls in the oven.
-
Bro most people can barely heat up pizza rolls in the oven.
I can’t tell if I communicated badly or I’m really just off the mark. But we already encrypt storage at rest, when we have valuable or sensitive data, because of the risk that thieves might read stolen data.
So take that a step farther. A thief can “know a guy” who spent a few hundred on soldering equipment and watched some tutorials on YouTube. We don’t consider sensitive data to be unavailable to thieves just because it isn’t readable via plug and play.
-
I can’t tell if I communicated badly or I’m really just off the mark. But we already encrypt storage at rest, when we have valuable or sensitive data, because of the risk that thieves might read stolen data.
So take that a step farther. A thief can “know a guy” who spent a few hundred on soldering equipment and watched some tutorials on YouTube. We don’t consider sensitive data to be unavailable to thieves just because it isn’t readable via plug and play.
What does any of that have to do with our pedantic argument about the use of the word "resourceful"?
-
I can’t tell if I communicated badly or I’m really just off the mark. But we already encrypt storage at rest, when we have valuable or sensitive data, because of the risk that thieves might read stolen data.
So take that a step farther. A thief can “know a guy” who spent a few hundred on soldering equipment and watched some tutorials on YouTube. We don’t consider sensitive data to be unavailable to thieves just because it isn’t readable via plug and play.
The opportunity to take you usb drive and copying its content real quick while you are distracted momentarily is eliminated. I can then decrypt it by calling the guy I know.
But I can't call the guy I know with the $50 setup that can extract the data for me in that time. It's not 100% unbreakable, but that doesn't have to be the criteria...
-
Bro most people can barely heat up pizza rolls in the oven.
But I like how squishy and soft they are from the microwave...
-
Kinda cool idea;; but the key can't be rewritten; so if something happens to your phone; it would be bricked.
So... not really that great??
Isn't that arguably the nature of encryption, though? If you lose the key, you're SOL by design.
-
1
-
Elon Musk’s Neuralink labeled itself as "disadvantaged business" before being valued at $9 billion
Technology1
-
-
An open letter signed by 602 tech founders, VCs, and more urges Sequoia Capital act after Shaun Maguire said Zohran Mamdani “comes from a culture that lies about everything”
Technology1
-
Google hit with $314m fine for collecting data from idle Android phones without permission
Technology1
-
-
-
Your Brain on ChatGPT: Accumulation of Cognitive Debt when Using an AI Assistant for Essay Writing Task
Technology1