• 3 Posts
  • 69 Comments
Joined 1 year ago
cake
Cake day: June 20th, 2023

help-circle




  • On actual server motherboards (as opposed to repurposed home PC’s) there is sometimes a special KVM like interface (keyboard/video/mouse, not the VM hypervisor) so you can connect to it with VNC and have the equivalent of local access. This is called IDRAC on Dell servers and other vendors have something similar.

    On a home PC, hmm, you might be able to set up some kind of remote power cycle and serial console connection, using a second computer (Raspberry Pi or the like). I’m unfamiliar with Intel AMT that you linked to, but it seems like another idea.

    I do remember hearing of a DRAC-like board for PC’s but the name of it escapes me right now.

    At the end of the day, if you want a long running server, you probably should host it in a data center, maybe with failover and other HA provisions. Home environments are a pain to set up for that. If your computer goes offline and you can’t reach it, how do you even know that your home isn’t having a power outage? Home ISP’s are flaky too, so maybe you want a backup route over mobile data, etc. Yes you can make workarounds for everything but it amounts to turning your home into a crappy low capacity data center.



  • If I understand Luks, the raw key is encrypted using the passphrase, so that is an ok scheme if the passphrase itself is too random to attack by brute force (unlike the 8 digit code that the Ironkey device uses). Look up “diceware” for a reasonable way to generate random phrases. Luks with this approach can be pretty good, though still potentially vulnerable to key loggers and other such attacks. Basically, put careful attention into what you are trying to protect against. High security commercial crypto (e.g. for banking) uses hardware modules in secure data centers, surrounded by 24/7 video surveillance. Check out the book “Security Engineering” by Ross Anderson if this sort of thing interests you. 1st and 2nd editions are on his website, use web search. Parts of the current 3rd edition are there too).


  • the actual data on the flash chip can be dumped easily

    I’d stop short of saying “easily” since you have to get the epoxy potting off of the chip. But you are right that there doesn’t seem to be any active tamper reactance. The numeric key is apparently 8 digits. Since it’s a 10 digit keypad, at least 2 of the digits are unused, and you might be able to recognize those from the comparative lack of fingerprints and wear on those specific keys. So that narrows down the search range some more.







  • P.S.: Maybe, I should ask on reddit or in a technical forum about it?

    I suppose so, but the overall picture may be about the same. Not just technical but also sociological changes have made this stuff less attractive. And even if your mixmaster or tor traffic is really anonymized (which is dubious), the fact you are using such services at all probably flags you for attention. If you just want to exchange email with your friend when you are both on the down low, you might be best off just both enrolling gmail accounts. There are so many gmail users that being one won’t attract attention, and with both people on the same service, all the traffic stays inside the google network and might be harder for outside agencies to connect with individual users (maybe foolish optimism). Plus, a lot of attention in the crypto nerd world shifted over to things like bitcoin.

    I have heard there was a recent development in single server PIR (private information retrieval). I haven’t yet tried to understand how it works, since it uses fancy cryptography (homomorphic encryption). In simplest form, let’s say there is a database with a billion records and you want record# 123456. PIR means being able to retrieve that specific record without the server learning which record it is that you want. There are known ways to do that by spreading the query between multiple, non-cooperating servers, but it was long believed that the only way to do it with a single server was for the client to download the entire database. This recent discovery apparently gives a way to do it with just one server, at some intermediate computational and network cost. That is of potential interest for this sort of application.


  • You’re right, I haven’t heard anything about that for a while. There is Tor but that seems to overreach enough that I can’t really believe in it. In general I think this stuff has become less interesting to work on due to changes in internet culture. Among other things, nobody today cares about delivering 20 kilobyte messages with 24+ hour latency, like Mixmaster did. They all want real time video and active web pages. It is unfortunate.