Tamper-evident preparation

Contents

A mixture of red and black lentils with a complex pattern. Electronic devices can be immersed in the mixture so that when they are accessed, the pattern changes.

Tamper-evident preparation is the process of taking precautionary measures to make it possible to detect when something has been physically accessed by an adversary.

Tamper-evident preparation can be used:

Examples of tamper-evident preparation techniques include:

Techniques addressed by this mitigation

NameDescription
Targeted digital surveillance
Authentication bypass

You can use tamper-evident preparation to detect when a device has been physically accessed.

Once a device has been physically accessed by an adversary, you should consider it compromised and never authenticate to it again. This is because, in a worst-case scenario, the adversary may have copied the device's data and compromised its firmware so that when you enter your password, they can remotely obtain it and use it to decrypt the data.

Physical access

You can use tamper-evident preparation to detect when something has been physically accessed by an adversary.