TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How would you set up a computer to protect against state-level actors?

5 点作者 c1sc0超过 2 年前
How would you setup your computer to work on a project that may be seen as threatening by state-level actors?<p>See: situation in Russia, China, ... What are your tips?

9 条评论

mytailorisrich超过 2 年前
If your threat model is the same as an intelligence service, which it basically would if in effect you wanted to protect against state intelligence services, then you would need to follow similar procedures.<p>AFAIK, it&#x27;s a common practice to have critical systems disconnected from the internet or external networks and located in rooms protected against human intrusion (duh) but also against remote sensing, which these days includes pretty much anything (RF, sound, light, etc).<p>You&#x27;d also need to take special measures to avoid equipment from being tampered with before it reaches you.<p>I read articles that the Russians were banning computers altogether in some circumstances and using typewriters instead.<p>But of course if this is indeed &quot;threatening&quot; you&#x27;d be as likely to have an &#x27;unfortunate accident&#x27; in any case.
评论 #33809819 未加载
floxy超过 2 年前
1.) Read &quot;Reflections on Trusting Trust&quot;: <a href="https:&#x2F;&#x2F;www.cs.cmu.edu&#x2F;~rdriley&#x2F;487&#x2F;papers&#x2F;Thompson_1984_ReflectionsonTrustingTrust.pdf" rel="nofollow">https:&#x2F;&#x2F;www.cs.cmu.edu&#x2F;~rdriley&#x2F;487&#x2F;papers&#x2F;Thompson_1984_Ref...</a><p>2.) ???<p>3.) Wallow in despair?
mikequinlan超过 2 年前
The first step would be to not store any confidential information electronically.<p><a href="https:&#x2F;&#x2F;www.theguardian.com&#x2F;world&#x2F;2013&#x2F;jul&#x2F;11&#x2F;russia-reverts-paper-nsa-leaks" rel="nofollow">https:&#x2F;&#x2F;www.theguardian.com&#x2F;world&#x2F;2013&#x2F;jul&#x2F;11&#x2F;russia-reverts...</a> for example.
t-3超过 2 年前
Don&#x27;t talk about it, and don&#x27;t give them any reason to look to closely at you. You can&#x27;t defend yourself from a huge organization as an individual, so you have to avoid catching their attention.
ozirus超过 2 年前
Use phishing resistant 2FA everywhere! (FIDO etc.) - avoid SMS<p>Limit admin privileges<p>Install an up-to-date antivirus&#x2F;HIPS&#x2F;EDR solution (with web protection)<p>Keep your OS and apps up-to-date (apply patches)<p>Periodically scan your system with tools like Loki, Thor Lite scanner etc.<p>Be careful about your browser extensions and their privileges<p>Make sure you don&#x27;t expose any public service to internet (RDP etc.)<p>Try to avoid Windows (if possible)<p>Implement application allowlisting<p>Use file-integrity apps to protect critical files<p>Monitor continuously (via NSM and EDR), respond ASAP (isolate etc.) when you see a sus. thing on your system&#x2F;network before they complete their objectives<p>Read about latest threats, evaluate your posture since threat landscape keeps changing<p>Read about threat&#x2F;incident reports regarding state-level actors targeted your industry in the past
rdtwo超过 2 年前
You don’t. A state level actor has access to all your data. You basically can’t connect to anything and always hold the asset
pyinstallwoes超过 2 年前
Probably not use a computer.
bitxbitxbitcoin超过 2 年前
Are you in Russia or China? If so the answer may be to not use a computer.
presheaf超过 2 年前
Can&#x27;t be done. The state is the one that produces the chips (Intel is just another branch of the government). Software is just a layer on top that can always be subverted with hardware by someone who knows the sequence of operations that will give them access.