this post was submitted on 02 Dec 2023
45 points (97.9% liked)

Cybersecurity News

1326 readers
1 users here now

Welcome to Cybersecurity News!

A community that collect news and other tidbits related to cybersecurity in all its domains.

There are no hard and fast rules regarding what to post here-- we are fine with both pop news articles and more technical pieces regarding cybersecurity.

We use a bot called flynnbot to repost some rss feed content but the majority of posts are human-curated.

New to Cybersecurity?

Here are some resources to get you started:

Related Communities

!security_cpe@infosec.pub
!cybersecurity@zerobytes.monster
!packetstorm@zerobytes.monster
!security@programming.dev
!secops@lemmy.world
!cybersecurity@sh.itjust.works
!netsec@zerobytes.monster
!securitynews@infosec.pub
!cloudsecurity@infosec.pub
!netsec@links.hackliberty.org
!cybersecurity@infosec.pub
!cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] loke@fedia.io 7 points 10 months ago (1 children)

Yes. If you turn off a computer it can't be compromised.

But I think the interesting question is if its possible have a system that does something useful, while at the same time be 100% secure.

The answer is probably yes, especially small systems that have been designed for a single purpose, but it would be incredibly difficult to prove it. Just because it hasn't been compromised yet doesn't mean it won't in the future.

Even doing a formal proof only proves things within the abstract model the proof works with.

[–] stoy@lemmy.zip 9 points 10 months ago (2 children)

I disagree, a computer that is turned off can absolutely be compromised, thought not remotely.

An attacker who gains access to a computer could take the hard drive (generic name for the boot drive or storage drive), then infect it with malware giving the attacker remote access later, then reassemble the machine.

By definition all systems can be hacked, the more complex the system, the more ways it can be hacked.

The one time pad system, is as far as I know the only encryption system that is unbreakable, if used properly, that is because it is so simple in theory, but during actual use in critical times, the system was misused by technicians, enabling some messages to be read.

[–] Amends1782@lemmy.ca 6 points 10 months ago (1 children)

Network booting with PXE, technically, can be a form of remote boot if its still hard wired to the network ,, so not even off is safe

[–] stoy@lemmy.zip 0 points 10 months ago (2 children)

To be fair, the PXE boot would not affext a powered off device, it would only be an issue if the device was powered on.

But this is just splitting hairs, you have a good point in that few people would expect a PXE boot attack, not to mention that it could interact with wake on lan, which would turn on a powered down computer.

[–] KairuByte@lemmy.dbzer0.com 4 points 10 months ago (1 children)

If a magic packet is accepted, off isn’t off. 😉

[–] stoy@lemmy.zip 1 points 10 months ago
[–] Amends1782@lemmy.ca 2 points 10 months ago

It totally is splitting hairs and I was just being super technical lol

[–] Slotos@feddit.nl 2 points 10 months ago (1 children)

One time pad system is only unbreakable if you ignore nearly everything about it.

It requires key exchange, storage, cordination, and disposal. In other words, the usual targets.

[–] stoy@lemmy.zip 1 points 10 months ago* (last edited 10 months ago)

Yep, that is why I noted "if used peoperly" (: