this post was submitted on 13 Jul 2023
10 points (100.0% liked)

Security

5005 readers
1 users here now

Confidentiality Integrity Availability

founded 5 years ago
MODERATORS
top 3 comments
sorted by: hot top controversial new old
[–] brownmustardminion@lemmy.ml 2 points 2 years ago (1 children)

What steps can one take to vet a usb drive before using or formatting it on a secure system?

Is it enough to spin up a VM or do you need a separate bare metal just for sandboxing usb drives?

[–] wmassingham@lemmy.world 3 points 2 years ago

It depends on how much you trust the drive. If you don't trust it at all, just don't use it. If you trust it completely, use it as-is. In the middle is stuff like sandboxing.

Passing untrusted USB devices to a VM is tricky, though. There are VM guest escape vulns. If you're passing the USB device itself through, you'll probably have it connected to the hypervisor for a short time before enabling passthrough. Is that safe? And if you're passing a discrete PCIe USB controller or something, you have to trust that the hypervisor has implemented that securely.

If you find a USB device on the street, throw it out.

[–] ReakDuck@lemmy.ml -1 points 2 years ago* (last edited 2 years ago)

Reason: they use Windows

No wonder its that easy

load more comments
view more: next ›