A DIY method proposes using beans, lentils, or colored rice in vacuum-sealed or transparent containers to create tamper-evident mosaics that reveal unauthorized physical access to sensitive devices. Inspired by glitter nail polish sealing, this approach emphasizes visual verification and low-cost materials for short- and long-term storage.

https://dys2p.com/en/2021-12-tamper-evident-protection.html

#HardwareSecurity #TamperDetection #InfosecTools #PhysicalSecurity

dys2p › Random Mosaic – Detecting unauthorized physical access with beans, lentils and colored rice

strengthening digital self-defense | research and development | providing privacy-focused goods and services

“Destroy data or else”—companies face millions in liability if old laptops aren’t properly wiped. A factory reset isn’t enough. Trust your sanitization process. 💻⚠️ #DataSanitization #HardwareSecurity

https://www.theregister.com/2025/09/14/destroy_data_company_laptops_or_else/

Data destruction done wrong could cost your company millions

: Doing a simple system reset may not be enough to save you from fines and lawsuits

The Register
The "2025 CWE Most Important Hardware Weaknesses”

Discover the 2025 most important hardware security weaknesses. Learn how to leverage this list to strengthen your security program.

Cycuity
First up in the session was Weber et al.'s "No Leakage Without State Change," introducing IRQGuard, a novel CPU-driven defense against microarchitectural attacks. (https://www.acsac.org/2024/program/final/s52.html) 2/6
#CyberSecurity #HardwareSecurity

📢New in our Research-Blog: A Tale of Practical Keylogger Forensics

On a recent engagement, an interesting hardware side quest popped up.
A client had found a #keylogger and, naturally, Cass Rebellin and @jrt wanted to know what the adversary had seen and if they could gather any useful traces towards the perpetrator.
The full story 👉https://research.hisolutions.com/2025/07/a-tale-of-practical-keylogger-forensics/

#ResearchBlog #DFIR #HardwareSecurity

🎥 Missed the TPM 2.0 deep dive? We made a video walkthrough.

🔐 Key hierarchies
🔐 Parent/child keys
🔐 Signing with Go + tpm2-tools

▶️ Watch the video: https://www.youtube.com/watch?v=zwnznp5KeQs
📖 Missed the article? Catch up here: https://victoronsoftware.com/posts/how-to-use-tpm/
#TPM #CyberSecurity #DeviceSecurity #HardwareSecurity #Golang #SecureKeyStorage

How to use TPM 2.0 to secure private keys

YouTube