TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: How would you set up a computer to protect against state-level actors?

5 pointsby c1sc0over 2 years ago
How would you setup your computer to work on a project that may be seen as threatening by state-level actors?<p>See: situation in Russia, China, ... What are your tips?

9 comments

mytailorisrichover 2 years ago
If your threat model is the same as an intelligence service, which it basically would if in effect you wanted to protect against state intelligence services, then you would need to follow similar procedures.<p>AFAIK, it&#x27;s a common practice to have critical systems disconnected from the internet or external networks and located in rooms protected against human intrusion (duh) but also against remote sensing, which these days includes pretty much anything (RF, sound, light, etc).<p>You&#x27;d also need to take special measures to avoid equipment from being tampered with before it reaches you.<p>I read articles that the Russians were banning computers altogether in some circumstances and using typewriters instead.<p>But of course if this is indeed &quot;threatening&quot; you&#x27;d be as likely to have an &#x27;unfortunate accident&#x27; in any case.
评论 #33809819 未加载
floxyover 2 years ago
1.) Read &quot;Reflections on Trusting Trust&quot;: <a href="https:&#x2F;&#x2F;www.cs.cmu.edu&#x2F;~rdriley&#x2F;487&#x2F;papers&#x2F;Thompson_1984_ReflectionsonTrustingTrust.pdf" rel="nofollow">https:&#x2F;&#x2F;www.cs.cmu.edu&#x2F;~rdriley&#x2F;487&#x2F;papers&#x2F;Thompson_1984_Ref...</a><p>2.) ???<p>3.) Wallow in despair?
mikequinlanover 2 years ago
The first step would be to not store any confidential information electronically.<p><a href="https:&#x2F;&#x2F;www.theguardian.com&#x2F;world&#x2F;2013&#x2F;jul&#x2F;11&#x2F;russia-reverts-paper-nsa-leaks" rel="nofollow">https:&#x2F;&#x2F;www.theguardian.com&#x2F;world&#x2F;2013&#x2F;jul&#x2F;11&#x2F;russia-reverts...</a> for example.
t-3over 2 years ago
Don&#x27;t talk about it, and don&#x27;t give them any reason to look to closely at you. You can&#x27;t defend yourself from a huge organization as an individual, so you have to avoid catching their attention.
ozirusover 2 years ago
Use phishing resistant 2FA everywhere! (FIDO etc.) - avoid SMS<p>Limit admin privileges<p>Install an up-to-date antivirus&#x2F;HIPS&#x2F;EDR solution (with web protection)<p>Keep your OS and apps up-to-date (apply patches)<p>Periodically scan your system with tools like Loki, Thor Lite scanner etc.<p>Be careful about your browser extensions and their privileges<p>Make sure you don&#x27;t expose any public service to internet (RDP etc.)<p>Try to avoid Windows (if possible)<p>Implement application allowlisting<p>Use file-integrity apps to protect critical files<p>Monitor continuously (via NSM and EDR), respond ASAP (isolate etc.) when you see a sus. thing on your system&#x2F;network before they complete their objectives<p>Read about latest threats, evaluate your posture since threat landscape keeps changing<p>Read about threat&#x2F;incident reports regarding state-level actors targeted your industry in the past
rdtwoover 2 years ago
You don’t. A state level actor has access to all your data. You basically can’t connect to anything and always hold the asset
pyinstallwoesover 2 years ago
Probably not use a computer.
bitxbitxbitcoinover 2 years ago
Are you in Russia or China? If so the answer may be to not use a computer.
presheafover 2 years ago
Can&#x27;t be done. The state is the one that produces the chips (Intel is just another branch of the government). Software is just a layer on top that can always be subverted with hardware by someone who knows the sequence of operations that will give them access.