#physicalsecurity — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #physicalsecurity, aggregated by home.social.
-
I attended the AITP Chicago Security SIG tonight at RSM and left with one clear takeaway: a $200 device called Flipper Zero can clone your building access badge and bypass the physical security your organization worked so hard to set up. FBI Chicago Intelligence Analysts and an InfraGard board member explained how these devices work and where organizations are vulnerable. The room was full of security professionals, many of whom had that familiar look, realizing a threat they thought was unlikely is actually much closer to home.
Here are a few key points from tonight:
・ You can buy Flipper Zero on Amazon, and teenagers are posting demo videos on YouTube. If your physical security plan assumes attackers need special equipment, that assumption is no longer true.
・ Most enterprise security programs barely address RF-based attacks on access control systems. We invest heavily in endpoint protection and network monitoring, but the badge reader by the server room often gets overlooked.
・ Mitigation is practical. Encrypted credentials and multi-factor physical access are real solutions. Most organizations just haven’t made them a priority because the threat seemed remote.If you’re a CISO or CIO and haven’t reviewed your physical access controls for RF-based attacks, now is a good time to add it to your to-do list.
Thank you to AITP Chicago, the FBI, InfraGard, and RSM for a great discussion.https://aitpchicago.com/event-6680905
#Cybersecurity #PhysicalSecurity #InfraGard #security #privacy #cloud #infosec #flipper0 -
https://www.europesays.com/britain/24018/ UK workers rank cyberattacks top threat to continuity #ArtificialIntelligence(AI) #BusinessContinuity #Cybersecurity #DataBreach #DigitalRisk #DigitalTransformation #EmployeeRetention #HealthAndSafety #IncidentResponse #Ireland #PhysicalSecurity #Productivity #RiskManagement #TalentRetention #UK #UnitedKingdom #UnitedKingdom(UK)
-
Why a Locked Floppy Disk Could Be Safer Than a Modern Network
Photo by CCDBarcodeScanner, licensed CC BY-SA 4.0 via Wikimedia Commons.Dear Cherubs, in the 1990s, office security had the elegance of a locked drawer and the threat model of a very determined coat thief. Floppy disks were the workhorses of the era, and Britannica notes they were popular from the 1970s until the late 1990s, made of flexible plastic coated with magnetic material. Before the internet became an everyday business utility, many workplaces were still mostly offline; Pew Research found that in 1995 only 14% of U.S. adults had internet access, and 42% had never heard of it.
THE LOCKED-BOX LOGIC
If your payroll files, drafts, and backups lived on removable media, the cleanest security move was physical control. Put the disks in a cabinet, lock the cabinet, and hope nobody on the third floor had a master key and a curious streak. It was a blunt system, but it worked because access was local, slow, and obvious. If someone needed a copy, they usually had to walk over, ask, sign something, and maybe endure a suspicious look from whoever guarded the supply room.
That is the part people forget when they romanticize the old days. The security was not magical; the attack surface was just tiny. To steal the data, someone usually had to be in the building, or at least within arm’s reach of the media. Annoyingly low-tech, yes. Also annoyingly effective.
MODERN SECURITY, NEW PROBLEMS
Once files moved onto networks and cloud systems, the game changed. NIST defines intrusion detection as monitoring events in a system or network for signs of possible incidents, and says intrusion prevention systems can also try to stop them. CISA says firewalls shield computers and networks from malicious or unnecessary traffic, while NIST says cryptography is used to protect sensitive digitized information during transmission and while in storage. In other words: the modern office traded one locked box for a whole stack of digital locks, alarms, and panic buttons.
Of course, the modern setup has its own virtues. Data can be backed up automatically, shared instantly, and protected with layered controls that the floppy-disk era never needed. NIST’s storage-encryption guidance still says organizations should physically secure devices and removable media, which is a polite way of saying: the box still matters, even when the box now lives in a server rack. Security did not become less important; it became more complicated, which is basically the same thing with extra meetings.
So yes, a locked plastic box full of floppies could be safer than a badly configured internet-facing system. But that is not because the past was wiser. It is because the past had fewer doors, fewer windows, and fewer strangers trying every handle on the planet at once. Security has always been a trade-off between convenience and control; we just used to do the math with keys instead of passwords.
Sources:
The Thisclaimer logo blends a classic warning symbol with a brain icon to represent critical thinking, curiosity, and thoughtful disclaimers. #cybersecurity #dataSecurity #encryption #firewalls #floppyDisks #internet #internetHistory #intrusionDetection #officeHistory #openSource #physicalSecurity #techNostalgia #technology #ubuntu #wordpress
Britannica — https://www.britannica.com/technology/floppy-disk
Pew Research Center — https://www.pewresearch.org/internet/2014/02/27/part-1-how-the-internet-has-woven-itself-into-american-life/
NIST SP 800-94 — https://csrc.nist.gov/pubs/sp/800/94/final
CISA firewalls — https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
NIST SP 800-175B Rev. 1 — https://csrc.nist.gov/pubs/sp/800/175/b/r1/final
NIST SP 800-111 — https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
Wikimedia Commons image page — https://commons.wikimedia.org/wiki/File:Floppy_Disk_HD.jpg -
Why a Locked Floppy Disk Could Be Safer Than a Modern Network
Photo by CCDBarcodeScanner, licensed CC BY-SA 4.0 via Wikimedia Commons.Dear Cherubs, in the 1990s, office security had the elegance of a locked drawer and the threat model of a very determined coat thief. Floppy disks were the workhorses of the era, and Britannica notes they were popular from the 1970s until the late 1990s, made of flexible plastic coated with magnetic material. Before the internet became an everyday business utility, many workplaces were still mostly offline; Pew Research found that in 1995 only 14% of U.S. adults had internet access, and 42% had never heard of it.
THE LOCKED-BOX LOGIC
If your payroll files, drafts, and backups lived on removable media, the cleanest security move was physical control. Put the disks in a cabinet, lock the cabinet, and hope nobody on the third floor had a master key and a curious streak. It was a blunt system, but it worked because access was local, slow, and obvious. If someone needed a copy, they usually had to walk over, ask, sign something, and maybe endure a suspicious look from whoever guarded the supply room.
That is the part people forget when they romanticize the old days. The security was not magical; the attack surface was just tiny. To steal the data, someone usually had to be in the building, or at least within arm’s reach of the media. Annoyingly low-tech, yes. Also annoyingly effective.
MODERN SECURITY, NEW PROBLEMS
Once files moved onto networks and cloud systems, the game changed. NIST defines intrusion detection as monitoring events in a system or network for signs of possible incidents, and says intrusion prevention systems can also try to stop them. CISA says firewalls shield computers and networks from malicious or unnecessary traffic, while NIST says cryptography is used to protect sensitive digitized information during transmission and while in storage. In other words: the modern office traded one locked box for a whole stack of digital locks, alarms, and panic buttons.
Of course, the modern setup has its own virtues. Data can be backed up automatically, shared instantly, and protected with layered controls that the floppy-disk era never needed. NIST’s storage-encryption guidance still says organizations should physically secure devices and removable media, which is a polite way of saying: the box still matters, even when the box now lives in a server rack. Security did not become less important; it became more complicated, which is basically the same thing with extra meetings.
So yes, a locked plastic box full of floppies could be safer than a badly configured internet-facing system. But that is not because the past was wiser. It is because the past had fewer doors, fewer windows, and fewer strangers trying every handle on the planet at once. Security has always been a trade-off between convenience and control; we just used to do the math with keys instead of passwords.
Sources:
The Thisclaimer logo blends a classic warning symbol with a brain icon to represent critical thinking, curiosity, and thoughtful disclaimers. #cybersecurity #dataSecurity #encryption #firewalls #floppyDisks #internet #internetHistory #intrusionDetection #officeHistory #openSource #physicalSecurity #techNostalgia #technology #ubuntu #wordpress
Britannica — https://www.britannica.com/technology/floppy-disk
Pew Research Center — https://www.pewresearch.org/internet/2014/02/27/part-1-how-the-internet-has-woven-itself-into-american-life/
NIST SP 800-94 — https://csrc.nist.gov/pubs/sp/800/94/final
CISA firewalls — https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
NIST SP 800-175B Rev. 1 — https://csrc.nist.gov/pubs/sp/800/175/b/r1/final
NIST SP 800-111 — https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
Wikimedia Commons image page — https://commons.wikimedia.org/wiki/File:Floppy_Disk_HD.jpg -
Why a Locked Floppy Disk Could Be Safer Than a Modern Network
Photo by CCDBarcodeScanner, licensed CC BY-SA 4.0 via Wikimedia Commons.Dear Cherubs, in the 1990s, office security had the elegance of a locked drawer and the threat model of a very determined coat thief. Floppy disks were the workhorses of the era, and Britannica notes they were popular from the 1970s until the late 1990s, made of flexible plastic coated with magnetic material. Before the internet became an everyday business utility, many workplaces were still mostly offline; Pew Research found that in 1995 only 14% of U.S. adults had internet access, and 42% had never heard of it.
THE LOCKED-BOX LOGIC
If your payroll files, drafts, and backups lived on removable media, the cleanest security move was physical control. Put the disks in a cabinet, lock the cabinet, and hope nobody on the third floor had a master key and a curious streak. It was a blunt system, but it worked because access was local, slow, and obvious. If someone needed a copy, they usually had to walk over, ask, sign something, and maybe endure a suspicious look from whoever guarded the supply room.
That is the part people forget when they romanticize the old days. The security was not magical; the attack surface was just tiny. To steal the data, someone usually had to be in the building, or at least within arm’s reach of the media. Annoyingly low-tech, yes. Also annoyingly effective.
MODERN SECURITY, NEW PROBLEMS
Once files moved onto networks and cloud systems, the game changed. NIST defines intrusion detection as monitoring events in a system or network for signs of possible incidents, and says intrusion prevention systems can also try to stop them. CISA says firewalls shield computers and networks from malicious or unnecessary traffic, while NIST says cryptography is used to protect sensitive digitized information during transmission and while in storage. In other words: the modern office traded one locked box for a whole stack of digital locks, alarms, and panic buttons.
Of course, the modern setup has its own virtues. Data can be backed up automatically, shared instantly, and protected with layered controls that the floppy-disk era never needed. NIST’s storage-encryption guidance still says organizations should physically secure devices and removable media, which is a polite way of saying: the box still matters, even when the box now lives in a server rack. Security did not become less important; it became more complicated, which is basically the same thing with extra meetings.
So yes, a locked plastic box full of floppies could be safer than a badly configured internet-facing system. But that is not because the past was wiser. It is because the past had fewer doors, fewer windows, and fewer strangers trying every handle on the planet at once. Security has always been a trade-off between convenience and control; we just used to do the math with keys instead of passwords.
Sources:
The Thisclaimer logo blends a classic warning symbol with a brain icon to represent critical thinking, curiosity, and thoughtful disclaimers. #cybersecurity #dataSecurity #encryption #firewalls #floppyDisks #internet #internetHistory #intrusionDetection #officeHistory #openSource #physicalSecurity #techNostalgia #technology #ubuntu #wordpress
Britannica — https://www.britannica.com/technology/floppy-disk
Pew Research Center — https://www.pewresearch.org/internet/2014/02/27/part-1-how-the-internet-has-woven-itself-into-american-life/
NIST SP 800-94 — https://csrc.nist.gov/pubs/sp/800/94/final
CISA firewalls — https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
NIST SP 800-175B Rev. 1 — https://csrc.nist.gov/pubs/sp/800/175/b/r1/final
NIST SP 800-111 — https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
Wikimedia Commons image page — https://commons.wikimedia.org/wiki/File:Floppy_Disk_HD.jpg -
Why a Locked Floppy Disk Could Be Safer Than a Modern Network
Photo by CCDBarcodeScanner, licensed CC BY-SA 4.0 via Wikimedia Commons.Dear Cherubs, in the 1990s, office security had the elegance of a locked drawer and the threat model of a very determined coat thief. Floppy disks were the workhorses of the era, and Britannica notes they were popular from the 1970s until the late 1990s, made of flexible plastic coated with magnetic material. Before the internet became an everyday business utility, many workplaces were still mostly offline; Pew Research found that in 1995 only 14% of U.S. adults had internet access, and 42% had never heard of it.
THE LOCKED-BOX LOGIC
If your payroll files, drafts, and backups lived on removable media, the cleanest security move was physical control. Put the disks in a cabinet, lock the cabinet, and hope nobody on the third floor had a master key and a curious streak. It was a blunt system, but it worked because access was local, slow, and obvious. If someone needed a copy, they usually had to walk over, ask, sign something, and maybe endure a suspicious look from whoever guarded the supply room.
That is the part people forget when they romanticize the old days. The security was not magical; the attack surface was just tiny. To steal the data, someone usually had to be in the building, or at least within arm’s reach of the media. Annoyingly low-tech, yes. Also annoyingly effective.
MODERN SECURITY, NEW PROBLEMS
Once files moved onto networks and cloud systems, the game changed. NIST defines intrusion detection as monitoring events in a system or network for signs of possible incidents, and says intrusion prevention systems can also try to stop them. CISA says firewalls shield computers and networks from malicious or unnecessary traffic, while NIST says cryptography is used to protect sensitive digitized information during transmission and while in storage. In other words: the modern office traded one locked box for a whole stack of digital locks, alarms, and panic buttons.
Of course, the modern setup has its own virtues. Data can be backed up automatically, shared instantly, and protected with layered controls that the floppy-disk era never needed. NIST’s storage-encryption guidance still says organizations should physically secure devices and removable media, which is a polite way of saying: the box still matters, even when the box now lives in a server rack. Security did not become less important; it became more complicated, which is basically the same thing with extra meetings.
So yes, a locked plastic box full of floppies could be safer than a badly configured internet-facing system. But that is not because the past was wiser. It is because the past had fewer doors, fewer windows, and fewer strangers trying every handle on the planet at once. Security has always been a trade-off between convenience and control; we just used to do the math with keys instead of passwords.
Sources:
The Thisclaimer logo blends a classic warning symbol with a brain icon to represent critical thinking, curiosity, and thoughtful disclaimers. #cybersecurity #dataSecurity #encryption #firewalls #floppyDisks #internet #internetHistory #intrusionDetection #officeHistory #openSource #physicalSecurity #techNostalgia #technology #ubuntu #wordpress
Britannica — https://www.britannica.com/technology/floppy-disk
Pew Research Center — https://www.pewresearch.org/internet/2014/02/27/part-1-how-the-internet-has-woven-itself-into-american-life/
NIST SP 800-94 — https://csrc.nist.gov/pubs/sp/800/94/final
CISA firewalls — https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
NIST SP 800-175B Rev. 1 — https://csrc.nist.gov/pubs/sp/800/175/b/r1/final
NIST SP 800-111 — https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
Wikimedia Commons image page — https://commons.wikimedia.org/wiki/File:Floppy_Disk_HD.jpg -
https://www.europesays.com/ch/46844/ SEALSQ and IC’Alps achieve key common criteria certification steps #Alps #CCEAL5+Certification #CommonCriteria(CC) #HardwareSecurity #IC'Alps #PhysicalSecurity #PostQuantumCryptographic(PQC) #QS7001 #QVault #SEALSQCorp #Security #SecurityCertificationPrograms #SERMA #SERMACESTI #SiteCertification
-
#physicalsecurity #cybersecurity #trustedplatformmodule #tpm #fujitsu secured! The tpm is only plugged and the only defense against simply unplugging it and taking it away together with the mass storage is a strategically dremeled screw. Well, it is a rather cheap system, but still...
-
#physicalsecurity #cybersecurity #trustedplatformmodule #tpm #fujitsu secured! The tpm is only plugged and the only defense against simply unplugging it and taking it away together with the mass storage is a strategically dremeled screw. Well, it is a rather cheap system, but still...
-
#physicalsecurity #cybersecurity #trustedplatformmodule #tpm #fujitsu secured! The tpm is only plugged and the only defense against simply unplugging it and taking it away together with the mass storage is a strategically dremeled screw. Well, it is a rather cheap system, but still...
-
This guy is handcuffed in our village! If you want to learn how to get out of handcuffs come by RSAC, in Moscone South 204 before we close at 2pm! #RSAC #RSAC2026 #RSAConference #physicalsecurity #handcuffs #physicalsecurityvillage
-
We spend so much time hardening our #GrapheneOS devices and sandboxing our apps, but we often leave our front doors wide open to analog tracking. 📬
In Episode 19 of Impractical Privacy, we dive into:
🔹 The MICT program
🔹 The Informed Delivery trap
🔹 Physical DefenseYour residence shouldn't be a data point on a broker's map. It’s time to shred the paper trail. ✂️
Listen here: impracticalprivacy.com
#Privacy #DigitalSovereignty #Metadata #Sudo #OptOut #SelfHosting #PhysicalSecurity #USPS -
A little work kvetching here, but willing to be contradicted by people in the know:
It is my experience that there are only two tiers of physical access control integrators: certifiably high-security operations, and everyone else.
...and my ongoing ~2 decades worth of experience with varied providers of the latter category is that they all seem to be awful without exception.
-
Canada, Nordics Deepen Arctic Security Ties, Back Greenland Sovereignty
Source: AFP (Bloomberg) — Canada and the Nordic countries agreed to ramp up defense production and deepen security…
#Conflict #Conflicts #War #bloomberg #Canada #Danmark #denmark #Greenland #MarkCarney #physicalsecurity #TheArctic
https://www.europesays.com/2855064/ -
Caetra new release v1.2.0; added new shield that reacts when a webcam turns it on/off.
With this shield we are trying to avoid privacy leaks from you and others, among possible security visual breaches like harvesting information about your surroundings. Do not forget to cover your webcam with a nice cat sticker :3
https://github.com/carvilsi/caetra
#physicalSecurity #physicalAttacks #linuxhardening #hardwareSecurity #bpf #ebpF #bcc
-
caetra new release v1.1.0; added new shield to react when the CD-DVD-ROM tray opens or closes.
https://github.com/carvilsi/caetra?tab=readme-ov-file#12-cd_dvd_rom
#physicalSecurity #physicalAttacks #linuxhardening #hardwareSecurity #bpf #ebpF #bcc
-
https://www.europesays.com/dk/40692/ Canada, Nordics Deepen Arctic Security Ties, Back Greenland Sovereignty #Bloomberg #Canada #Greenland #MarkCarney #PhysicalSecurity #TheArctic
-
New Caetra release; Fix bug related with bcc adding missing struct bpf_wq to support kernel 6.14.0-37 on 24.04.1-Ubuntu (noble)
-
The suspected rail sabotage in northern Italy highlights a recurring challenge: protecting physical infrastructure during high-profile global events.
With fires, damaged signaling components, and hours-long delays reported, the incident underscores how transport systems remain exposed to disruption even without advanced technical methods.
Source: https://therecord.media/italy-suspected-sabotage-winter-olympics-trains
💬 How should critical infrastructure protection evolve for large-scale international events?
🔔 Follow TechNadu for ongoing analysis of infrastructure and security risks
#CriticalInfrastructure #InfrastructureSecurity #PhysicalSecurity #RiskAssessment #PublicTransport #TechNadu
-
The suspected rail sabotage in northern Italy highlights a recurring challenge: protecting physical infrastructure during high-profile global events.
With fires, damaged signaling components, and hours-long delays reported, the incident underscores how transport systems remain exposed to disruption even without advanced technical methods.
Source: https://therecord.media/italy-suspected-sabotage-winter-olympics-trains
💬 How should critical infrastructure protection evolve for large-scale international events?
🔔 Follow TechNadu for ongoing analysis of infrastructure and security risks
#CriticalInfrastructure #InfrastructureSecurity #PhysicalSecurity #RiskAssessment #PublicTransport #TechNadu
-
The suspected rail sabotage in northern Italy highlights a recurring challenge: protecting physical infrastructure during high-profile global events.
With fires, damaged signaling components, and hours-long delays reported, the incident underscores how transport systems remain exposed to disruption even without advanced technical methods.
Source: https://therecord.media/italy-suspected-sabotage-winter-olympics-trains
💬 How should critical infrastructure protection evolve for large-scale international events?
🔔 Follow TechNadu for ongoing analysis of infrastructure and security risks
#CriticalInfrastructure #InfrastructureSecurity #PhysicalSecurity #RiskAssessment #PublicTransport #TechNadu
-
The suspected rail sabotage in northern Italy highlights a recurring challenge: protecting physical infrastructure during high-profile global events.
With fires, damaged signaling components, and hours-long delays reported, the incident underscores how transport systems remain exposed to disruption even without advanced technical methods.
Source: https://therecord.media/italy-suspected-sabotage-winter-olympics-trains
💬 How should critical infrastructure protection evolve for large-scale international events?
🔔 Follow TechNadu for ongoing analysis of infrastructure and security risks
#CriticalInfrastructure #InfrastructureSecurity #PhysicalSecurity #RiskAssessment #PublicTransport #TechNadu
-
The suspected rail sabotage in northern Italy highlights a recurring challenge: protecting physical infrastructure during high-profile global events.
With fires, damaged signaling components, and hours-long delays reported, the incident underscores how transport systems remain exposed to disruption even without advanced technical methods.
Source: https://therecord.media/italy-suspected-sabotage-winter-olympics-trains
💬 How should critical infrastructure protection evolve for large-scale international events?
🔔 Follow TechNadu for ongoing analysis of infrastructure and security risks
#CriticalInfrastructure #InfrastructureSecurity #PhysicalSecurity #RiskAssessment #PublicTransport #TechNadu
-
Just released v1.0.1 of Caetra: Linux Physical Security based on eBPF.
🐛 Fix bug related with bcc v0.35.0 (supports up to Linux 6.14), adding missing struct "bpf_task_work" to support kernel 6.18.5
-
Linux Physical Security based on eBPF
By now uses CanaryToken and-or TelegramBot to send notifications
I have in mind some TODOs, one of them is about monitor accelerometers, if someone has accelerometers sensors on the laptop, please send DM I'm very hype to implement this feature.
-
An interesting read on physical car security for keyless entry and engine starts.
https://paigehai.github.io/blog/my-keyless-car-got-stolen-so-i-worked-out-how-they-did-it/
But I doubt that any of the current mitigation techniques will in broad practice bear any fruit because ... people love the convenience. That's why they buy that sh*t. That's why they use Gmail, etc.
And manufacturers aren't moving fast (or at all), and definitely not on vehicles already sold.
In my books, the main problem mainly originates between the ears of people/customers.
-
Beyond the surface of a steel door lies a world of precision engineering. From internal reinforcements to blast-resistant cores. Ever wondered what makes a security door virtually impenetrable?
We’re peeling back the steel layers to show you.
https://vocal.media/stories/the-hidden-engineering-behind-high-security-steel-doors
#SecurityEngineering #SteelDoors #PhysicalSecurity #Architecture #BuildingDefense -
New release v5.1.2 for CanaryUSB that fixes a :bug: when building long canaryDNS tokens.
Get a mail notification via, Canary Tokens (DNS) when a USB or SDCard device is connected on a Linux computer.
Also it is possible to de-authorize an USB that is not present on trusted devices list.
https://github.com/carvilsi/canaryusb/releases/tag/v5.1.2
#usb #linux #security #physicalSecurity #sdcard #canaryToken
-
@[email protected] @GrapheneOS
Pros of mobile over desktop/tablet/laptop form factor -->
Physical security of your primary cpu and disk is enhanced by the kind of portability you can always keep in your pocket. No evil maid attacks with your (convergence?) daily driver always in sight. No bad usb (rubber ducky) attacks or untrusted peripherals.
#SecureBoot protections only necessary realistically in very narrow circumstances like border crossings or seizures.
#PhysicalSecurity #AEM #BadUSB #Mobile #Convergence #RFHardened
-
Happy to share the new release of canaryusb; right now apart of sending a mail via #canaryToken powered by @ThinkstCanary the new feature deauth_devices (on config file or on cli argument `-d`) allows to de-authorize a USB device attached that does is not on the trust devices list.
https://github.com/carvilsi/canaryusb/releases/tag/v5.1.0
The de-authorize thingy based on https://www.kernel.org/doc/html/v5.15/usb/authorization.html#usage
Of course this new feature requires to execute it as root user (all the thing explained on README if you want to run it as a service)
Also fixed a bug related with cli args parsing ;)
<3 hack the planet!
#linux #security #usb #hardening #monitoring-tool #security-automation #security-tools #physicalSecurity
-
🚀💻 Join us tomorrow, Sept 10th, 6:30PM Eastern for Crack the Locks. RSVP - https://www.meetup.com/spacecoastsec/events/309726384 #cybersecurity #buildingcommunity #spacecoast #physicalsecurity #locksport #lockpicking 💻🚀
-
Enterprise-Ready Solutions for Physical Security – Source: securityboulevard.com https://ciso2ciso.com/enterprise-ready-solutions-for-physical-security-source-securityboulevard-com/ #rssfeedpostgeneratorecho #SecurityBloggersNetwork #enterprisesecurity #CyberSecurityNews #SecurityBoulevard #DeviceManagement #physicalsecurity #Cybersecurity #SSO
-
test your skills by joining @bsidesfra's fun and challenging covert access vault, sponsored by NVISO. who knows, you may be the lucky winner😉🏆
#BSidesFRA #BSidesFrankfurt #RedTeaming #PhysicalSecurity #CyberSecurity #InfoSec #HandsOn #NVISO
-
We aim to impress you more every year-this time with hands-on physical attack challenges! Test your skills on NVISO's amazing covert access vault. Don't fear AI taking your job; become a physical red teamer (or burglar)!
#BSidesFRA #BSidesFrankfurt #RedTeaming #PhysicalSecurity #CyberSecurity #InfoSec #HandsOn #NVISO
-
Facility Executive April 2025: The Operational Resilience Issue - The April 2025 issue of Facility Executive focuses on operational resilience. Learn how your organization can adapt to changing circumstances, or risk being left behind. #BuildingEnvelope #BusinessContinuity #EnergyManagement #Lighting #FacilityManagement #HVAC #PhysicalSecurity #ProfessionalDevelopment #Technology #Interiors #WorkplaceSafety https://facilityexecutive.com/facility-executive-april-2025-the-operational-resilience-issue/
-
DeadSwitch Protocol - Ghost Papers: Shattering Trails Before They Are Found #GhostPapers #DeadSwitchProtocol #PhysicalSecurity #OperationalSecurity #CyberGhost #TomITCafe
-
Regulating AI Behavior with a Hypervisor – Source: www.schneier.com https://ciso2ciso.com/regulating-ai-behavior-with-a-hypervisor-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor – Source: www.schneier.com https://ciso2ciso.com/regulating-ai-behavior-with-a-hypervisor-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor – Source: www.schneier.com https://ciso2ciso.com/regulating-ai-behavior-with-a-hypervisor-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor – Source: www.schneier.com https://ciso2ciso.com/regulating-ai-behavior-with-a-hypervisor-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.”
Abstract:As AI models become more embedded in critical sectors like finance, healthca... https://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html#physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.”
Abstract:As AI models become more embedded in critical sectors like finance, healthca... https://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html#physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.”
Abstract:As AI models become more embedded in critical sectors like finance, healthca... https://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html#physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.”
Abstract:As AI models become more embedded in critical sectors like finance, healthca... https://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html#physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.”
Abstract:As AI models become more embedded in critical sectors like finance, healthca... https://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html#physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor https://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html #physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor https://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html #physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor https://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html #physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor https://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html #physicalsecurity #academicpapers #Uncategorized #threatmodels #AI