Bridging the Air Gap; Data Transfer via Fan Noise

When you want to protect a computer connected to the Internet against attackers, you usually put it behind a firewall. The firewall controls access to the protected computer. However, you can defeat any lock and there are ways a dedicated attacker can compromise a firewall. Really critical data is often placed on a computer that is “air gapped.” That is, the computer isn’t connected at all to an insecure network.

An air gap turns a network security problem into a physical security problem. Even if you can infect the target system and collect data, you don’t have an easy way …read more

Continue reading Bridging the Air Gap; Data Transfer via Fan Noise

Is there a GNU/Linux or BSD distribution dedicated to air-gapped computer? [closed]

I am currently in the process of setting up an air-gapped computer which will be dedicated to managing cryptographic key (including: generation of GPG key/subkey, management of a small CA, generation of SSH key).

I am wondering if there a… Continue reading Is there a GNU/Linux or BSD distribution dedicated to air-gapped computer? [closed]