Buchanan walks through his process of experimenting with low-cost fault-injection attacks as an alternative when typical software bugs aren't available to exploit.

    • BrikoX@lemmy.zip
      hexagon
      M
      ·
      22 hours ago

      Not if the storage is encrypted. That's why vulnerabilities in operating systems/kernel are so impactful, as they can bypass that encryption.

      • LunchMoneyThief@links.hackliberty.org
        ·
        12 hours ago

        It's a bit more nuanced even.

        If you have one-time physical access, then you have total access, permitting the storage is not encrypted.

        If you have recurring, undetected physical access, then you have total access.

        Ex: Dropping a script into someone's unencrypted /boot partition that captures the decryption credential, then coming back later to collect the credential and maybe also remove the evidence.