this post was submitted on 14 Jul 2023
19 points (100.0% liked)

Cybersecurity

5618 readers
320 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 1 year ago
MODERATORS
 

The idea is that is that I have a dual boot linux/windows.
Where linux is secure and encrypted, and windows is the honeypot.

windows is the default boot option.

edit 2:
I titled this wrong and I worded it wrong, i'll try again later.
Next time : Murphy's law allways wins, assume my laptop will get stolen. And i want to recover it remotely.

I'm not changing my behaviour, I already lowered the likelyhood of theft by switching my macbook for a secondhand thinkbook.

top 14 comments
sorted by: hot top controversial new old
[–] [email protected] 5 points 1 year ago (1 children)

What's the threat model here? And adversary that you need a honeypot to fool isn't fooled by half your hard drive being an encrypted LUKS partition.

Weaker adversaries are fooled by much simpler setups, such as hidden files.

Security by obscurity is not security. Honeypots are obscurity, I'd you want security then the LUKS login screen is what provides it.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (2 children)

Bad title, The threat is that my laptop will get stolen, murphy's law allways wins.
How do I increase the chance to recover?

Thieves are stupid too, they will just use the default installed windows.

[–] [email protected] 3 points 1 year ago (1 children)

Windows partition has no user password so they connect it to wifi, and it auto launches a tracker software on boot that tells you where it is.

However that means your laptop is gone if the fence decides to wipe it, and it having no password means it's easier to convince a second hand store that they own the laptop (as opposed to trying to sell a laptop and the clerk goes "unlock it so I know it's not stolen"), increasing the chance they wipe it.

On top of that, just because you know where it is (assuming geoposition is precise enough (it's not)) doesn't mean you can recover it. Even when you are sure it is somewhere the police won't help you.

Thieves may be stupid but they steal stuff that is left without supervision. Try taking better care of your devices and maybe a convoluted tracking system is simply never needed because your laptop won't be stolen?

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

I allways promise myself to be better and not do stupid things, experience thought me that that only works 95%. I like a plan B, even if it does not work; at least I tried.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago) (2 children)

Here's an easy plan B for you: laptop locks are dirt cheap. You know the ones that go around a table leg and lock with a key to the slot in the side of the laptop? They weigh 50 grams and cost less than 10 bucks. Sure they're easy to bypass in concept, just lift the table, but that's making a commotion and a thief doesn't want that.

[–] [email protected] 2 points 1 year ago

Tie the other end around your own leg for extra security

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

That's actually a good plan. after a "downgrade" fom macbook to thinkbook I do have a lock connector.

[–] [email protected] 1 points 1 year ago

I'll be tieing it around a tree instead of a table leg. But hell yea! thinkbooks have lock connectors!
And it's only a downgrade because i cheaped out and bought what I needed instead of top perf.

[–] [email protected] 3 points 1 year ago (1 children)

I dont think honeypot is the right term here, the only situation i can see something like this being at all useful is for a border search where you have to unlock your computer to be searched, in which case you'll need to actually hide the fact that there is a second partition at all, my suggestion would be get a laptop that can support 2 internal drives, unplug one before you travel and have the second one be a generic windows install with some stuff to make it look used.

[–] [email protected] 0 points 1 year ago* (last edited 1 year ago) (1 children)

I like to be careless about my posessions, border control is the least of my worries.
yes i should have titled this better.

[–] [email protected] 2 points 1 year ago

Titles are editable in Lemmy

[–] [email protected] 2 points 1 year ago

This is technically physical security, but it's the best community that i could find.

[–] [email protected] 2 points 1 year ago

This is along the lines of the old TrueCrypt hidden partition

You boot into the HD lock and one password unlock Linux another windows

I’ve not done that in a while. Now VeraCrypt Here’s the link

https://www.veracrypt.fr/en/Hidden%20Operating%20System.html

Id think that a windows laptop and then boot to a Linux VM or boot off an usb to Linux if you’re getting crazy with the cheezwhiz

load more comments
view more: next ›