Himanshu Shekhar a écrit : > This reminds of an outcome that makes your system vulnerable to data theft. > Following the above steps, anyone having physical access to the device by > any means (which is more likely in case of mobile devices), could gain root > access and do whatever one wants to do with the system as well as the data.
Anyone with physical access can do whatever they want. You can set up restrictions in the BIOS or set restrictions in the boot loader, but they still can take the disk out and read or modify it with another machine. To protect against this you can use encryption or set up a password on the disk (ATA security functions). Note that encryption alone does not protect against tampering, as the boot part cannot be encrypted.