Prove someone entered and exited a room at specific times without any biometric authentication

There is a room. There is a lot of incentive for people to enter this room. This room allows you to enter and exit whenever you want, but for each minute you stay in the room, you get a dollar. Problem is, it’s very hard to get to the room… Continue reading Prove someone entered and exited a room at specific times without any biometric authentication

How good/bad are these transparent Linux consumer FDE setup options? (e.g. for auto-unlocking LUKS)

UPDATED Summary: I’m looking at Linux FDE options that are transparent to the user (my parents) in that the user doesn’t need to enter 2 passwords. I found/thought of several options and tried to think through the security implications of … Continue reading How good/bad are these transparent Linux consumer FDE setup options? (e.g. for auto-unlocking LUKS)

Options for Integrating or developing a physical security solution (physical access control via in-house mobile apps [NFC/Bluetooh])

Our team is looking to either integrate or develop a physical security solution for a rather large campus.
Requirements:
Ability to either integrate (with reader/electronic lock hardware) from our mobile apps which would allow access contr… Continue reading Options for Integrating or developing a physical security solution (physical access control via in-house mobile apps [NFC/Bluetooh])

In an enterprise environment, should developers/maintainers be able to look at production logs by accessing the application servers?

I came across this practice, from a big company handling personal customer data, of not allowing developers/maintainers to look straight at the application logs (e.g. good old tail | grep) by connecting to the application servers through S… Continue reading In an enterprise environment, should developers/maintainers be able to look at production logs by accessing the application servers?

What is needed for decently secure multi desktop user system where the users have access to input devices, but not to the machine itself?

Assuming the OS is some GNU+Linux distribution,
What is needed to secure such a setup. Are there some things that assume that if you have access to the things described, you own the system? Or anything else? Is such a setup feasible?
The s… Continue reading What is needed for decently secure multi desktop user system where the users have access to input devices, but not to the machine itself?