Isolation & Compartmentalisation Flashcards

1
Q

How can hardware be linked to the owner

A

Hardware has unique serial numbers that can lead back to the buyer if not purchased anonymously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where can MAC address be found Hardware wise

A

In your Network Card
Can be used to De-anonymise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do the first 3 bytes refer to in 08:00:27:5b:2e:59

A

Unique to the manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do the last 3 bytes refer to in 08:00:27:5b:2e:59

A

Specific to network card, Wi-Fi card, Ethernet Crad etc.
Unique to your device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two sites/apps that can be used on windows and Linux to change MAC addr

A

Technitium.com/tmac
MACchanger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False:
Anonymous Hardware & MAC addr changes are a good combination for anonymity

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Are CPUs Identifiable

A

No modern CPU should have software readable serial numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Are Motherboards Identifiable

A
  • Often carry unique serials in the SMBIOS memory which OEMs will have stored
  • Even when using Tails on a paid OS, the hardware ID will be shared so anonymity wont be achieved
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name some ways to mitigate Hardware IDs

A

1) Buy anonymously, no trail
2) Change them
3) Use VMs, have their own physical ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name some ways to enforce virtual isolation

A

1) Separating your assets into different encrypted folders or volumes (NAS)
2) Hidden encrypted volumes
3) Use of separate session keys when transporting data
4) Using portable apps (over encrypted USBs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is using a portable version of Firefox on an encrypted USB with cloud file sharing services a good combination for isolation

A
  • Portable apps don’t leave install traces
  • All recorded data stored locally in the one file (easy to move or delete)
  • Encrypted USB with separate keys ensures more security of data
  • Cloud services allow files to not even be stored locally to allow remote access and avoid physical interception
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does using portable apps facilitate plausible deniability

A
  • Use a regular version of Firefox for regular browsing
  • Portable version for private browsing
  • Can give up ‘normal’ Firefox data if forced
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is a dual boot good for use on one machine

A

Allows for multiple security domains
MacOS for everyday and Linux for Security and Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the downfall of a dual boot

A
  • Can’t access multiple OS simultaneously like with VMs
  • Due to being virtual, file systems between OSs aren’t physically separated so one OS could be used to exploit the other
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a sandbox

A

A virtual container or isolated environment used to keep contents confined within it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are sandboxes used for

A

Running high-risk applications or for running code and tests

17
Q

True or False:
Sandboxes are full proof

A

False:
everything has exploits so it’s imperative to optimise your sandbox

18
Q

What are some available sandboxes

A

VMs
BufferZone
Shadow Defender
Deep Freeze
Returnil
BitDefender

19
Q

What are some optimisations that can be done for VM security

A

1) Remove all comms between host and guest
2) Dedicated seccure device for VM use incase of leak
3) Use separate USB network dongle and place VM on separate network
- or use VLAN (physical)

20
Q

What can be done to protect leaks from VMs

A

1) Use full disk encryption as its hard to know what files are left by VM
2) Create hidden or encrypted OS where hypervisor is installed
- only provides security when physical machine is off
3) Use live OS
4) Use VM snapshots