1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-23 03:04:21 +00:00
Files
i18n/i18n/ja/basics/hardware.md
2025-05-26 13:39:04 +00:00

15 KiB
Raw Blame History

title, icon, description
title icon description
ハードウェアを選ぶ material/chip ソフトウェアだけが全てではありません。プライバシーを守るために日常的に使うハードウェアのツールについて学びましょう。

プライバシーについて議論する際、ハードウェアはソフトウェアほど考慮されていないことが多いです。 ハードウェアはプライバシーを設定するもう一つの基礎であると考えるべきです。

コンピューターを選ぶ

デバイスの内部では全てのデジタルデータを処理し、保存しています。 デバイスはメーカーや開発者によってセキュリティアップデートを受け続けることができるようサポートされていることが重要です。

ハードウェアセキュリティプログラム

「ハードウェアセキュリティプログラム」のあるデバイスもあります。ハードウェアを設計する際のベストプラクティスや推奨に関するベンダー間の協力によって成り立っています。例えば以下のものが挙げられます:

  • WindowsのセキュアコアPC は、マイクロソフトによって定められた高いセキュリティ基準を満たすものです。 Windowsのユーザーだけではなく、 他のOSのユーザーもDMA保護 やMicrosoftの証明書を完全に信用しないようにする機能を利用することができます。
  • Android Ready SE はデバイスがベストプラクティスに従い、暗号化キーなどのために耐タンパ性のあるストレージが含まれていることを保証するベンダー間の協力によるものです。
  • Apple SoC上で動作するmacOSは他のOSでは利用できないハードウェアセキュリティを活用しています。
  • ChromeOSのセキュリティはChromebook上で実行する際にhardware root-of-trustのようなハードウェアの機能を使うことができるため、最も強力なものとなります。

上記のOSを使っていなくても、プログラムに参加しているメーカーはハードウェアセキュリティやアップデートに関するベストプラクティスに従っていることを示している可能性があります。

プリインストールOS

Macや特別なLinuxマシンを買わない限り、新しいコンピューターにはほとんどの場合、Windowsがプリインストールされています。 ドライブを消去し、選んだOSを新たにインストールすることWindowsを再インストールすることもはよい考えです。 ハードウェアベンダーと怪しいソフトウェアベンダーとの契約により、デフォルトのWindowsにはあらかじめロードするように設定されたブロートウェア、アドウェアマルウェアがあることが多いです。

ファームウェアの更新

ハードウェアにはセキュリティ上の問題が発見されることがあり、ファームウェアアップデートによりパッチが適用されます。

マザーボードからストレージデバイスに至るまで、コンピューターのほぼ全てのコンポーネントは動作するのにファームウェアが必要です。 全てのコンポーネントが完全にサポートされていることが理想的です。 Appleのデバイス、Chromebook、ほとんどのAndroid端末、Microsoft Surfaceはデバイスがサポートされている限り、ファームウェアアップデートがあります。

自作PCの場合は、マザーボードのファームウェアはOEMのウェブサイトからダウンロードし、手動でアップデートする必要があるかもしれません。 Linuxの場合、ビルトインのpwupdを使い、マザーボードで利用可能なファームウェアアップデートを確認、適用することを検討してください。

TPM/セキュア暗号プロセッサー

ほとんどのコンピューターや携帯電話にはTPMもしくは同様のセキュア暗号プロセッサーが搭載されており、暗号鍵を安全に保存し、その他セキュリティ関連の機能を処理します。 もし、このような機能がないマシンを使っているのであれば、機能のある新しいコンピューターを購入するほうがよいでしょう。 デスクトップ・サーバーのマザーボードの中にはTPMを搭載した小型のアクセサリーボードをつけることができる「TPMヘッダー」があるものもあります。

メモ

仮想TPMはサイドチャネル攻撃の影響を受けやすく、外部TPMは攻撃者がハードウェアにアクセスできる場合、マザーボード上のCPUから分離されているため、スニッフィングに脆弱です。 セキュアプロセッサーをCPU自体に内蔵することが解決策であり、AppleのチップやMicrosoftのPlutonが例として挙げられます。

Biometrics

Many devices come equipped with a fingerprint reader or face recognition capabilities. These can be very convenient, but they aren't perfect and sometimes fail. Most devices will fall back to a PIN or password when this happens, meaning that the security of your devices is still only as good as your password.

Biometrics can prevent someone from watching you type in your password, so if shoulder-surfing is part of your threat model then biometrics are a good option.

Most implementations of face authentication require you to be looking at your phone and also only work from a relatively close distance, so you don't need to worry too much about someone pointing your phone at your face to unlock it without your consent. You can still disable biometrics when your phone is locked if you want. On iOS, you can hold the side button and a volume button for 3 seconds to disable Face ID on models that support it. On Android, hold the power button and press Lockdown on the menu.

注意

Some devices do not have the proper hardware for secure face authentication. There are two main types of face authentication: 2D and 3D. 3D face authentication makes use of a dot projector that lets the device create a 3D depth map of your face. Make sure that your device has this capability.

Android defines three security classes for biometrics; you should check that your device is Class 3 before enabling biometrics.

Device Encryption

If your device is encrypted, your data is most secure when your device is completely powered off (as opposed to merely asleep), i.e. before you've entered your encryption key or lock screen password for the first time. On phones, this state of higher security is referred to as "Before First Unlock" (BFU), and "After First Unlock" (AFU) once you enter the correct password after a reboot/power-on. AFU is considerably less secure against digital forensics toolkits and other exploits, compared to BFU. Therefore, if you are concerned about an attacker with physical access to your device, you should turn it off fully whenever you aren't using it.

This may be impractical, so consider whether it's worth it, but in either case even AFU mode is effective against most threats, given you are using a strong encryption key.

External Hardware

Some threats can't be protected against by your internal components alone. Many of these options are highly situational; please evaluate if they are really necessary for your threat model.

ハードウェアセキュリティ

Hardware keys are devices that use strong cryptography to authenticate you to a device or account. The idea is that because they can not be copied, you can use them to secure accounts in such a way that they can only be accessed with physical possession of the key, eliminating many remote attacks.

Recommended Hardware Keys :material-arrow-right-drop-circle:{ .md-button .md-button--primary } Learn More about Hardware Keys :material-arrow-right-drop-circle:{ .md-button }

Camera/Microphone

If you don't want to trust your OS's permission controls to prevent the camera from activating in the first place, you can buy camera blockers that physically prevent light from reaching the camera. You could also buy a device that doesn't have a built-in camera and use an external camera that you can unplug whenever you're done using it. Some devices come with built-in camera blockers or hardware switches that physically disconnect the camera from power.

注意

You should only buy covers that fit your laptop and won't cause damage when you close the lid. Covering the camera will interfere with automatic brightness and face authentication features.

For microphone access, in most cases you will need to trust your OS's built-in permission controls. Alternatively, buy a device that doesn't have a built-in microphone and use an external microphone that you can unplug when you're done using it. Some devices, like a MacBook or an iPad, feature a hardware disconnect for the microphone when you close the lid.

Many computers have a BIOS option to disable the camera and microphone. When disabled there, the hardware won't even appear as a device on a booted system.

Privacy Screens

Privacy screens are a film you can put over your normal screen so that the screen is only visible from a certain angle. These are good if your threat model includes others peeking at your screen, but it is not foolproof as anyone could just move to a different viewing angle and see what's on your screen.

Dead Man's Switches

A dead man's switch stops a piece of machinery from operating without the presence of a human operator. These were originally designed as a safety measure, but the same concept can be applied to an electronic device to lock it when you're not present.

Some laptops are able to detect when you're present and can lock automatically when you aren't sitting in front of the screen. You should check the settings in your OS to see if your computer supports this feature.

You can also get cables, like BusKill, that will lock or wipe your computer when the cable is disconnected.

Anti-Interdiction/Evil Maid Attack

The best way to prevent a targeted attack against you before a device is in your possession is to purchase a device in a physical store, rather than ordering it to your address.

Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.

Secure your Network

Compartmentalization

Many solutions exist that allow you to separate what you're doing on a computer, such as virtual machines and sandboxing. However, the best compartmentalization is physical separation. This is useful especially for situations where certain software requires you to bypass security features in your OS, such as with anti-cheat software bundled with many games.

For gaming, it may be useful to designate one machine as your "gaming" machine and only use it for that one task. Keep it on a separate VLAN. This may require the use of a managed switch and a router that supports segregated networks.

Most consumer routers allow you to do this by enabling a separate "guest" network that can't talk to your main network. All untrusted devices can go here, including IoT devices like your smart fridge, thermostat, TV, etc.

Minimalism

As the saying goes, "less is more". The fewer devices you have connected to your network, the less potential attack surface you'll have and the less work it will be to make sure they all stay up-to-date.

You may find it useful to go around your home and make a list of every connected device you have to help you keep track.

Routers

Your router handles all your network traffic and acts as your first line of defense between you and the open internet.

Note

A lot of routers come with storage to put your files on so you can access them from any computer on your network. We recommend you don't use networking devices for things other than networking. In the event your router was compromised, your files would also be compromised.

The most important thing to think about with routers is keeping them up-to-date. Many modern routers will automatically install updates, but many others won't. You should check on your router's settings page for this option. That page can usually be accessed by typing 192.168.1.1 or 192.168.0.1 into the URL bar of any browser assuming you're on the same network. You can also check in the network settings of your OS for "router" or "gateway".

If your router does not support automatic updates, you will need to go to the manufacturer's site to download the updates and apply them manually.

Many consumer-grade routers aren't supported for very long. If your router isn't supported by the manufacturer anymore, you can check if it's supported by FOSS firmware. You can also buy routers that come with FOSS firmware installed by default; these tend to be supported longer than most routers.

Some ISPs provide a combined router/modem. It can be beneficial for security to purchase a separate router and set your ISP router/modem into modem-only mode. This way, even when your ISP-provided router is no longer getting updates, you can still get security updates and patches. It also means any problems that affect your modem won't affect your router and vice versa.