Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The kernel lives on /boot, and could be subverted to lie about its uptime to convince you that there was no unplanned reboot.

This is the same methodology I use, and I think about these attacks a lot. There is no good/cheap way to verify a remote execution environment right now with commodity hardware. :/



That's not possible. Even if you fool the kernel, you still can't mount the encrypted disk. The fact that the encrypted disk is not mounted is proof that there has been an unplanned reboot.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: