The public's level cybersecurity understanding means we have to do something different.
Basic Security
People have no qualms doing the computer equivalent of the dirty plate when buying used computers. They buy a used computer with an operating system already installed. They boot the machine and start using it. The buyers trust the installation and use that computer for their most private transactions. We have plenty of evidence that people receive machines with malware, bot-ware, or intrusive software that sends data back to some other servers.
The same people would never log into their bank account on some random machine they find sitting unlocked in a coffee shop.
Risks
- Deliberate malware
- Accidental malware
- Monitoring Software
- Keyloggers - a kind of monitoring
- Botnet software
- Incriminating or embarrassing images and files
- Unlicensed software
Chromebook Powerwash
All devices should come with some single button erase and re-install feature similar to Chromebook Powerwash. Currently, the Chromebook is the only platform that has anything even close to this with its Powerwash functionality.
Video
Slides from the Video
Stories that make me sad
I recently sold a computer without an operating system on eBay. I erased and then encrypted the drive and then threw away the encryption keys. The purchaser demanded to return the machine because it was useless to them because it didn't have Microsoft windows installed. The machine had a Windows COA. I told them it had a COA and that they could install the Operating System from Thumb Drive and pointed them at the web site. They were not happy.
I told them it was a huge security risk to accept a machine that was installed and configured by some random stranger. I tried to explain that they should never trust someone like me to provide them a virus-free installation. The buyer said they had done it plenty of times. They viewed a machine as "unusable" without a pre-installed operating system. You can guess how the conversation went from there.
What to do with a used machine
- Assume the machine is compromised.
- Do not let the used machine on the local network until after re-install
- Discard the hard drive or vigorously clean it.
- Erase and scrub the hard drive
- Encrypt the hard drive and then format without the keys
- Install a fresh operating system from fresh boot media.
Created 10/22
Comments
Post a Comment