Isolation & Compartmentalisation Flashcards
How can hardware be linked to the owner
Hardware has unique serial numbers that can lead back to the buyer if not purchased anonymously
Where can MAC address be found Hardware wise
In your Network Card
Can be used to De-anonymise
What do the first 3 bytes refer to in 08:00:27:5b:2e:59
Unique to the manufacturer
What do the last 3 bytes refer to in 08:00:27:5b:2e:59
Specific to network card, Wi-Fi card, Ethernet Crad etc.
Unique to your device
What are two sites/apps that can be used on windows and Linux to change MAC addr
Technitium.com/tmac
MACchanger
True or False:
Anonymous Hardware & MAC addr changes are a good combination for anonymity
True
Are CPUs Identifiable
No modern CPU should have software readable serial numbers
Are Motherboards Identifiable
- Often carry unique serials in the SMBIOS memory which OEMs will have stored
- Even when using Tails on a paid OS, the hardware ID will be shared so anonymity wont be achieved
Name some ways to mitigate Hardware IDs
1) Buy anonymously, no trail
2) Change them
3) Use VMs, have their own physical ID
Name some ways to enforce virtual isolation
1) Separating your assets into different encrypted folders or volumes (NAS)
2) Hidden encrypted volumes
3) Use of separate session keys when transporting data
4) Using portable apps (over encrypted USBs)
Why is using a portable version of Firefox on an encrypted USB with cloud file sharing services a good combination for isolation
- Portable apps don’t leave install traces
- All recorded data stored locally in the one file (easy to move or delete)
- Encrypted USB with separate keys ensures more security of data
- Cloud services allow files to not even be stored locally to allow remote access and avoid physical interception
How does using portable apps facilitate plausible deniability
- Use a regular version of Firefox for regular browsing
- Portable version for private browsing
- Can give up ‘normal’ Firefox data if forced
Why is a dual boot good for use on one machine
Allows for multiple security domains
MacOS for everyday and Linux for Security and Privacy
What is the downfall of a dual boot
- Can’t access multiple OS simultaneously like with VMs
- Due to being virtual, file systems between OSs aren’t physically separated so one OS could be used to exploit the other
What is a sandbox
A virtual container or isolated environment used to keep contents confined within it