[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

shipment interdiction [was: BadBIOS forensics]



If you donâ??t mind saying, can you say if you are a US citizen?  (Probably)

Do you work on an open source project like TOR?  Do you think they do that because you do development?

Iâ??d love if we build a profile of who they actively perform hardware attacks on.  They likely repeat this on categories of people (TOR devs, employees at CAs, etc.).   Even if you can give a vague category (crypto-currency vs open source file system encryption, etc.)

That one lady on twitter was a TOR dev.

Iâ??d love us to deduce as many patterns as possible, so those people can be incredibly diligent.

Best,
-Bryan

Bryan Starbuck   |  [email protected]

On Jul 19, 2014, at 5:25 PM, coderman <[email protected]> wrote:

> On Sat, Jul 19, 2014 at 5:20 PM, Bryan Starbuck <[email protected]> wrote:
>> I like buying a computer in a surprise visit to an apple store or a store
>> that sells windows computers.
> 
> 
> agreed; on site ad-hoc cash purchases the best procurement technique.
> not infallible by any means, but at least avoids some known problems
> like this amusing scenario.
> 
> (shipments from the Seattle Amazon warehouse to Kansas before delivery
> to Oregon was also funny.)
> 
> 
> repeat for emphasis:
> - keep chain of custody of sensitive hardware at all times
> - never procure or ship through mail. at one point, priority same day
> air would get a pass, but even this no longer suitable.
> 
> 
> best regards,

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20140719/3f7a9984/attachment.html>