misusing USB keycards?
misusing USB keycards?
Posted Oct 5, 2017 10:44 UTC (Thu) by tao (subscriber, #17563)In reply to: misusing USB keycards? by anarcat
Parent article: Strategies for offline PGP key storage
I always figured air-gapped meant that the system isn't accessible remotely, not that local attackers aren't able to reach it. If you have local access to hardware, generally all bets are off. An airgapped system isn't connected by WIFI, BT, ethernet, or whatever other means you use to connect to a network, and is preferably kept in a shielded environment. This is the kind of spec needed for things like machines used for signing top level certificates, etc.
The term I'd normally associate with a system that can withstand things like badUSB would be tamper-proof. An ATM, for instance.
Sometimes there's an overlap, and there are degrees of airgapping and tamper-proofing. You probably don't want wifi, BT, etc. for your ATM, but it's definitely connected to the Internet, though hopefully on a VLAN.
