For those of you who are using linux: Are you using secure boot? I.e. is your bootloader configured to only decrypt your disk and boot your OS, while blocking all “booting from USB stick” and such?

I’m asking because i’m considering a very specific attack vector, through which a sufficiently skilled agent (e.g. FBI, CIA) could install a keylogger into your OS and get access to your sensitive data that way, even when your disk is encrypted and without your knowledge.

  • Willoughby@piefed.world
    link
    fedilink
    English
    arrow-up
    29
    ·
    2 days ago

    Keep your OS updated, make regular backups, use full-disk-encryption, and nuke and pave whenever things get cluttery. You’ll be alright.

    Were it me and I just went through a TSA screening and they took it and returned,… I may nuke the laptop.

    • grue@lemmy.world
      link
      fedilink
      arrow-up
      16
      ·
      2 days ago

      If I had that sort of threat model and let the government get their hands on my computer, I would never trust the hardware again. Too many components with their own SoCs containing firmware blobs where an exploit could lurk and reinfect even after a ‘nuke.’ GPUs, disk controllers, WiFi chips, etc.

      • Willoughby@piefed.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        2 days ago

        Good thinking, shoot it with a 12ga slug.

        but seriously, time and sense are a factor there. A few seconds? In front of me? I’d waver that action under a few conditions.

        • SpikesOtherDog@ani.social
          link
          fedilink
          English
          arrow-up
          0
          arrow-down
          1
          ·
          17 hours ago

          Wipe and resell on local buy/sell/trade. They will monitor someone else. Otherwise, put it on a separate subnet and use a bot to reshare every scrap of social media it can touch.