My Keyoxide Idendity:

aspe:keyoxide.org:TJXAWXPMSAG6VPARJQRWNB2TPA

  • 1 Post
  • 8 Comments
Joined 6 months ago
cake
Cake day: April 11th, 2024

help-circle





  • Hm, so when using Nextcloud, is the db itself encrypted or something?

    All my devices are encrypted.

    Access to the decrypted data requires RAM access, or even a cold boot attack. There are people that only use their USB 3.0 ports and desolder all the rest, because normal (non thunderbolt) USB is pretty safe and has no access to the RAM, unlike PCIe, SATA etc.

    This would be fun and certaily possible modifying the hardware to fit those SSDs still inside the case could be fun too.

    I have 4 enclosures for that, and using Ethernet would mean the Wifi Card (Intel AX3000, a modded 200 for mPCIe) could be removed.

    https://www.spiegel.de/netzwelt/web/hardware-hacker-wie-man-einen-laptop-vor-angreifern-schuetzt-a-955702.html

    Or access to the server via ssh (fail2ban, strong keys) or the admin or user nextcloud accounts (again with strong passwords and possibly TOTP or webauthn).

    I already fiddled with the required Nextcloud Addons for TOTP and it worked great. Webauthn is an Android/GrapheneOS limitation poorly, maybe that gets fixed some day.

    The issue of course is upgrades. I should do a second post on that topic. There are solutions for that, like mounting encrypted partitions and running Nextcloud on there. This could be automated.

    For the obvious raid attack, I would have a udev rule that detects when AC is disconnected and then performs a clean shutdown.