Himanshu Shekhar a écrit :
> This reminds of an outcome that makes your system vulnerable to data theft.
> Following the above steps, anyone having physical access to the device by
> any means (which is more likely in case of mobile devices), could gain root
> access and do whatever one wants to do with the system as well as the data.

Anyone with physical access can do whatever they want. You can set up
restrictions in the BIOS or set restrictions in the boot loader, but
they still can take the disk out and read or modify it with another machine.

To protect against this you can use encryption or set up a password on
the disk (ATA security functions). Note that encryption alone does not
protect against tampering, as the boot part cannot be encrypted.

Reply via email to