Gentoo Archives: gentoo-user

From: Laurence Perkins <lperkins@×××××××.net>
To: "gentoo-user@l.g.o" <gentoo-user@l.g.o>
Subject: RE: [gentoo-user] KDE, sddm etc security. Plus LVM question.
Date: Tue, 22 Mar 2022 16:54:30
Message-Id: DM5PR07MB4055AFE38359D4DE649EC6C7D2179@DM5PR07MB4055.namprd07.prod.outlook.com
In Reply to: Re: [gentoo-user] KDE, sddm etc security. Plus LVM question. by Rich Freeman
1 > -----Original Message-----
2 > From: Rich Freeman <rich0@g.o>
3 > Sent: Monday, March 21, 2022 5:21 PM
4 > To: gentoo-user@l.g.o
5 > Subject: Re: [gentoo-user] KDE, sddm etc security. Plus LVM question.
6 >
7 > On Mon, Mar 21, 2022 at 8:03 PM Laurence Perkins <lperkins@×××××××.net> wrote:
8 > >
9 > > The TPM in most computers doesn't dump the keys if someone tries to open the case to install hardware sniffers.
10 > >
11 >
12 > That's a good point, though if somebody with the ability to sniff the RAM or (to a lesser degree) GPU traffic is after you, then you probably want to be on the lookout for rubber hose decryption.
13 >
14 > If you're a big spender the AMD Secure Memory Encryption feature would probably help there, assuming they ever get it working on Linux.
15 >
16 > --
17 > Rich
18 >
19 >
20
21 There are a lot of circumstances where the attacker doesn't want you to know you've been compromised. At least not right away. Tamper detection can be useful for avoiding that.
22
23 Along similar lines there's a kernel module available, the project name slips my mind, which can be set to wipe keys, memory, etc. if the system is booted without a particular USB device attached, or if the device is removed. Gives one a way to quickly "decommission" a system.
24
25 LMP