SD Card Exploit
The SD card on many single board computers is easily removable, by design, for the convenience of developers and manufacturing. Unfortunately this convenience is also on offer to hackers. Within just a few minutes, they can easily remove the card, clone and or modify the contents, then re-insert – without detection.
This attack vector can be mitigated by encrypting the SD card with device unique credentials, such that a cloned copy cannot easily be decrypted on another system under the attackers control and timeline.
An additional layer of physical tamper detection can significantly raise the barrier to an attack – as it slows the timeline and lowers the chances of successfully removing and re-installing an SD card.
Learn how to encrypt an SD card >