How secure is Heads for detecting tampering or infection of firmware or boot sector? (Pureboot)

I’m thinking of getting a Librem laptop with Pureboot which uses Heads (with the Librem key) for tamper detection. But I’ve heard rumours that there are weaknesses or vulnerabilities so I wanted to see if anyone here knows about it. For me… Continue reading How secure is Heads for detecting tampering or infection of firmware or boot sector? (Pureboot)

What’s the point of providing file checksums for verifying downloads?

Many projects offering binaries, also offer hashes (e.g. SHA256) of those binaries, wither as .ASC files, or directly on the web page near the binary. This isn’t to protect against network-caused corruption, as that’s ensured by the TCP pr… Continue reading What’s the point of providing file checksums for verifying downloads?

How could malware disable third party security software?

I’m asking this question with the assumption that anything the user can do, so can malware.

I’m using a third party firewall on my system to control which programs are able to access the internet. However I notice that I – as a limited us… Continue reading How could malware disable third party security software?

Does the WP(Write Protect) pin of a USB flash memory controller prevent tampering with its firmware?

Does WP(Write Protect) pin of a USB flash memory controller prevent tampering with its firmware?

I want to have an USB stick that I can make it read-only and insert it in any untrusted PC without risking a silent BadUSB infection.

I was … Continue reading Does the WP(Write Protect) pin of a USB flash memory controller prevent tampering with its firmware?

Does TLS (Transport Layer Security) protect against deliberate tampering or accidental corruption?

If someone tampers with data being transmitted over HTTPS using TLS, would that result in a corrupted decrypted message or would it result in the error being detected such as through a cryptographic checksum and retransmitted?

This has … Continue reading Does TLS (Transport Layer Security) protect against deliberate tampering or accidental corruption?

Is multiplying hashes a valid way to ensure two sets of data are identical (but in arbitrary order)

Let’s say “User A” has a set of data like below. Each entry has been hashed (sha256) to ensure integrity within a single entry. You can’t modify data of a single entry without also modifying the corresponding hash:

[
{ data: “000000”, has… Continue reading Is multiplying hashes a valid way to ensure two sets of data are identical (but in arbitrary order)