Why is an HSM required to protect CA certificates (rather than a regular USB token)?

Typical USB tokens (Nitrokey, YubiKey…) allow an everyday user to store PGP keys and use them to encrypt email, harddrives and so on.

The same vendors also offer distinct products called HSMs (Nitrokey HSM, YubiHSM). The suggested use c… Continue reading Why is an HSM required to protect CA certificates (rather than a regular USB token)?

Is there some type of x-ray that can see through HSM or shielded integrated circuit?

I know that security-oriented products can easily protect their contents from even the most sensitive commercial x-rays, which can see objects at about 0.5µm. But let’s put cost limits aside (or imagine that we have State-level resources),… Continue reading Is there some type of x-ray that can see through HSM or shielded integrated circuit?

Is it possible to bypass USB access restriction placed by the Active Directory? [closed]

I’ve been tasked with an onsite engagement to see what I can find from one of their laptops. They have a policy in place to block USB access through the Active Directory, e.g. When you try to access the USB drive, you will ge… Continue reading Is it possible to bypass USB access restriction placed by the Active Directory? [closed]

Can an air-gapped PC receive malicious code even when completely clean, apart from all physically attacks?

The Basic question is in the title there are more questions bellow but it is in context of the question in the title…hopefully

What i have read is that it can eavesdrop the Airgap PC via

acoustic
light
seismic
magnetic
t… Continue reading Can an air-gapped PC receive malicious code even when completely clean, apart from all physically attacks?