maloki
February 17th, 2012, 04:28 PM
Hi.
For those of you who use full system encryption, you may or may not have heard of a small program called "evil maid" which in minutes can install itself from a usb to the MBR, then works as a key logger, which then results in a worthless encryption.
One solution would be to install the boot partition to a usb and booting from it every time, a second solution would be to check md5 hash checksum of the boot partition, before (live cd?) or after login.
My question is: how do I check the hash of my boot partition?
Any ideas on how to render a hardware attack useless (powered of computer) would also be appreciated
For those of you who use full system encryption, you may or may not have heard of a small program called "evil maid" which in minutes can install itself from a usb to the MBR, then works as a key logger, which then results in a worthless encryption.
One solution would be to install the boot partition to a usb and booting from it every time, a second solution would be to check md5 hash checksum of the boot partition, before (live cd?) or after login.
My question is: how do I check the hash of my boot partition?
Any ideas on how to render a hardware attack useless (powered of computer) would also be appreciated