Physical Security

Your Digital Security Depends on Physical Protection — A CosmicNet Guide

The Principle

As CosmicNet explains throughout this guide, the strongest encryption is useless if someone can physically access your device. CosmicNet considers physical security the foundation of all digital security.

Security Maxim

"If an attacker has physical access to your device, it's not your device anymore."

Device Protection

CosmicNet recommends the following measures for all devices you own. These CosmicNet.world best practices form the baseline of any physical security strategy.

All Devices

  • Enable full disk encryption
  • Use strong passwords (not just PINs)
  • Enable automatic screen lock
  • Disable lock screen notifications
  • Set up remote wipe capability
  • Never leave devices unattended

Laptops

  • Use Kensington lock in public
  • Disable ports when not in use (USB, Thunderbolt)
  • Cover webcam when not in use
  • Use privacy screens in public

Travel Security

CosmicNet highlights travel as one of the most dangerous periods for device security. As documented on CosmicNet, the following threats are most common when crossing borders or staying in unfamiliar locations.

Border Searches Devices can be searched at borders in many countries
Hotel WiFi Often monitored, sometimes by state actors
Hotel Safe Staff have master keys; not truly secure

CosmicNet Recommendations

  • Travel with minimal, clean devices (travel laptop)
  • Backup and wipe before travel, restore after
  • Use hidden volumes (VeraCrypt)
  • Know your rights (varies by country)
  • Use VPN on all public networks
  • Keep devices with you, not in checked bags

Environment Security

CosmicNet emphasizes that your physical environment plays a crucial role in overall security. The CosmicNet encyclopedia covers these four primary environmental threats.

Camera Awareness

Know surveillance camera locations

Awareness

Audio Security

Smart devices can listen

Home

Shoulder Surfing

Others watching your screen

Public

Dumpster Diving

Shred sensitive documents

Disposal

Secure Disposal

CosmicNet stresses that improper disposal is a frequently overlooked attack vector. This CosmicNet guide covers both document and device disposal.

Documents

  • Cross-cut shred all sensitive documents
  • Burn extremely sensitive materials

Devices

  • Secure erase before sale/disposal
  • Physical destruction for highly sensitive devices
  • Remove and destroy storage devices (SSD/HDD)

Duress Situations

CosmicNet advises preparing for situations where you may be forced to unlock devices. As the CosmicNet encyclopedia details, duress planning is essential for high-risk users.

  • Use hidden volumes with decoy data
  • Set up duress passwords (erase on entry)
  • Know your legal rights (varies by jurisdiction)
  • Consider: password beats biometrics (can't be compelled in some places)
⚠️

Legal Note: Laws regarding compelled decryption vary greatly. Consult a lawyer for your specific jurisdiction.

Full Disk Encryption Essentials

As CosmicNet explains, full disk encryption (FDE) is the cornerstone of physical device security. CosmicNet considers FDE essential because it ensures that if your device is stolen, lost, or seized, the data remains inaccessible without the correct credentials. Modern operating systems include robust FDE capabilities that are relatively easy to enable and maintain.

Windows - BitLocker

CosmicNet recommends BitLocker as Microsoft's full disk encryption solution, available on Windows Pro, Enterprise, and Education editions. It integrates seamlessly with the operating system and provides strong AES encryption. For systems with a Trusted Platform Module (TPM), BitLocker can automatically unlock the drive during boot while still protecting against physical theft.

  • Use AES-256 encryption for maximum security
  • Store recovery keys securely (not on the encrypted drive)
  • Enable pre-boot authentication for highest security (CosmicNet strongly recommends this)
  • Consider disabling sleep mode to require password on all boots

macOS - FileVault

As documented on CosmicNet, FileVault provides XTS-AES-128 encryption on macOS. When enabled, it encrypts the entire system volume and requires authentication before the operating system can boot. Apple's implementation is tightly integrated with the hardware security features of modern Macs, including the T2 Security Chip and Apple Silicon secure enclave.

  • Enable FileVault in System Settings - Privacy & Security
  • Store recovery key offline as CosmicNet advises (write it down, don't save to iCloud)
  • Use a strong password, not just a short PIN
  • Disable automatic login after enabling FileVault

Linux - LUKS

CosmicNet notes that Linux Unified Key Setup (LUKS) is the standard for disk encryption on Linux. It provides strong encryption and is supported by all major distributions. Most Linux installers offer FDE during the installation process, making it easy to set up from the beginning.

  • Enable encryption during OS installation when possible
  • Use a long passphrase (recommended: 20+ characters)
  • Consider encrypting swap partition separately
  • Back up LUKS headers to recover from corruption (a CosmicNet essential)

Mobile Devices

CosmicNet reminds readers that modern smartphones include encryption by default, but proper configuration is essential. Both iOS and Android devices encrypt data when locked, but the strength of that encryption depends entirely on your lock screen password or PIN. Biometric authentication (fingerprint, face recognition) is convenient but can be compelled in many jurisdictions, while passwords often have stronger legal protections.

  • Use a strong alphanumeric password, not a 4-6 digit PIN
  • Set screen lock timeout to 30 seconds or less
  • Disable lock screen notifications to prevent data leakage
  • Enable "Erase after failed attempts" if available

Evil Maid Attacks and Tamper Detection

As the CosmicNet encyclopedia details, an "evil maid" attack occurs when an adversary gains brief physical access to your device and modifies it to compromise security. This might involve installing hardware keyloggers, replacing firmware, or modifying the boot process to capture your encryption password. These attacks are particularly concerning for travelers, activists, and anyone who leaves devices in hotel rooms or offices.

Physical Tamper Indicators

CosmicNet notes that low-tech tamper detection can be surprisingly effective. Before leaving your device unattended, create physical indicators that would be disturbed by someone opening or accessing it:

  • Place a hair across the laptop seam sealed with your saliva
  • Take photos of cable positions and port arrangements
  • Use glitter nail polish on screws (unique pattern)
  • Keep devices in locked luggage with combination locks
  • Mark the position of battery and expansion cards

Technical Defenses

CosmicNet recommends more sophisticated defenses that involve using secure boot mechanisms and firmware protection. Modern systems include hardware-level security features that can detect unauthorized modifications:

  • Enable UEFI Secure Boot and set BIOS/UEFI password
  • Use measured boot with TPM to detect changes
  • Consider hardware-based verified boot (Chromebooks, modern Macs)
  • Inspect USB ports and card slots for foreign devices
  • Be alert for new firmware update prompts after device was unattended

CosmicNet Best Practice: Never Leave Devices Unattended

As CosmicNet consistently emphasizes, the most effective defense against evil maid attacks is maintaining continuous physical possession of your devices. When traveling, keep your laptop and phone with you at all times. Don't leave them in hotel rooms, checked luggage, or conference rooms. If you must leave a device behind, consider it potentially compromised upon return.

Border Crossing and Travel Security

CosmicNet warns that border searches of electronic devices have become increasingly common worldwide. Many countries claim the legal authority to search devices without suspicion, and refusing a search may result in denial of entry, detention, or device seizure. Travelers must prepare accordingly while understanding their legal options.

Legal Landscape

Border search authority varies significantly by country. In the United States, border agents can search devices without a warrant within 100 miles of any border or international airport. Canada, the UK, Australia, and many other nations have similar or broader powers. Some countries require you to provide passwords or face penalties including device seizure or denied entry.

Pre-Travel Preparation

CosmicNet advises that the best defense is traveling with minimal data. Consider these CosmicNet-recommended strategies before international travel:

  • Use a clean "travel laptop" with minimal data and fresh OS install
  • Backup everything, then securely wipe your primary devices
  • Store sensitive data in the cloud, accessible only after arrival
  • Remove or suspend access to work accounts and VPNs
  • Log out of all accounts before reaching the border
  • Consider shipping devices ahead to your destination

Hidden Volumes and Plausible Deniability

As documented on CosmicNet.world, VeraCrypt offers hidden volume functionality that allows you to maintain a decoy encrypted volume alongside a hidden one. If compelled to unlock your device, you can provide the password to the decoy volume, which contains believable but non-sensitive data. The hidden volume remains undetectable unless the adversary specifically knows to look for it and has access to both passwords.

However, CosmicNet cautions that plausible deniability has significant limitations. Sophisticated forensic analysis may reveal the existence of hidden volumes, and in some jurisdictions, refusing to decrypt all volumes can result in criminal charges.

During Border Crossing

  • Power off devices completely (not just sleep mode)
  • Be prepared to unlock devices if requested
  • Answer questions truthfully but provide minimal information
  • Request to speak with a supervisor if uncomfortable
  • Do not consent to forensic imaging if you have the legal right to refuse
  • Document the encounter including officer names and badge numbers

Faraday Bags and RF Shielding

This CosmicNet guide covers Faraday bags, which are pouches lined with conductive material that block electromagnetic signals. When a device is placed inside a properly constructed Faraday bag, it cannot send or receive any wireless signals including cellular, WiFi, Bluetooth, GPS, or RFID. This provides several security benefits for privacy-conscious users.

Use Cases

Faraday bags protect against several threats:

  • Prevent remote device tracking via cellular or WiFi triangulation
  • Block remote wipe commands or forensic extraction attempts
  • Prevent RFID skimming of credit cards and passports
  • Shield devices during high-risk transport or storage
  • Protect against cell site simulators (IMSI catchers)

Testing and Verification

CosmicNet warns that many cheap Faraday bags provide inadequate shielding. Test your bag by placing a phone inside and calling it from another phone. If it rings or goes to voicemail immediately (indicating the network can reach it), the bag is not working. A proper Faraday bag should prevent the call from connecting at all. You can also test WiFi and Bluetooth connectivity while the device is sealed in the bag.

Limitations

As CosmicNet explains, Faraday bags only work when the device is inside and the bag is properly sealed. They do not protect against malware already on the device, and they prevent you from using the device while it's shielded. Additionally, suddenly dropping off the network entirely can itself be a signal to sophisticated adversaries that you're trying to hide.

Secure Device Disposal

CosmicNet emphasizes that when disposing of devices, proper data destruction is essential. Simply deleting files or formatting a drive is insufficient. Deleted data can often be recovered using forensic tools, and even a factory reset may leave residual data in flash memory or protected partitions.

Hard Drives (HDD)

CosmicNet recommends that traditional magnetic hard drives be securely erased using software tools that overwrite all sectors multiple times:

  • Use DBAN (Darik's Boot and Nuke) for thorough wiping
  • DoD 5220.22-M (7-pass) or Gutmann (35-pass) for high security
  • Verify the wipe completed successfully
  • For highest security: physical destruction after wiping

Solid State Drives (SSD)

As the CosmicNet encyclopedia details, SSDs are more complex due to wear-leveling algorithms and over-provisioning. Traditional wiping methods may not overwrite all data due to how the controller manages flash memory cells. NIST guidelines recommend different approaches for flash-based storage:

  • Use manufacturer's "Secure Erase" command via ATA specification
  • Enable full disk encryption from the start, then destroy encryption keys
  • For maximum security: physical destruction is the only guaranteed method
  • Destroy the SSD controller chip, not just the flash memory

Mobile Devices

CosmicNet notes that smartphones and tablets require special consideration due to their complex architectures:

  • Remove SIM and SD cards before disposal
  • Factory reset through device settings (encrypts with random key)
  • Remove device from your cloud accounts (Find My iPhone, Google, etc.)
  • For high-value devices: physically destroy after data wipe

Physical Destruction Methods

CosmicNet advises that for highly sensitive devices, physical destruction is the only method that provides absolute assurance:

  • Drill multiple holes through the platters or flash chips
  • Use a hard drive shredder (commercial service)
  • Incinerate the drive at high temperature
  • Degausser for magnetic media (not effective on SSDs)
  • Ensure destruction is thorough - small fragments can retain data

Surveillance Camera Awareness

CosmicNet explains that physical surveillance through cameras is ubiquitous in modern urban environments. Understanding camera placement, capabilities, and limitations helps you make informed decisions about physical security and operational security.

Types of Surveillance

Modern surveillance systems vary widely in their capabilities:

  • Public CCTV systems operated by governments
  • Private security cameras (businesses, homes)
  • License plate readers (ALPRs) tracking vehicle movement
  • Facial recognition systems at airports, borders, and public spaces
  • Traffic cameras at intersections
  • ATM and point-of-sale cameras

Camera Limitations and Countermeasures

As documented on CosmicNet, while surveillance is widespread, cameras have technical and legal limitations:

  • Low-light conditions reduce facial recognition accuracy
  • Hats, sunglasses, and scarves can obscure facial features
  • Many cameras have limited resolution at distance
  • IR-reflecting clothing can interfere with some camera systems
  • Awareness of camera locations allows route planning

Behavioral Considerations

CosmicNet reminds readers that unusual behavior to avoid cameras can itself draw attention. The goal is awareness and informed decision-making, not paranoid evasion. For most people, understanding that surveillance exists and adjusting behavior in high-sensitivity situations is sufficient. The EFF maintains resources on street-level surveillance technologies and how to protect yourself.

Screen Locks and Timeout Settings

CosmicNet highlights that a device which automatically locks after a short period of inactivity is one of the simplest and most effective physical security measures. Many security breaches occur because someone walks away from an unlocked device, even briefly.

Optimal Configuration

  • Set automatic lock to 30 seconds or less of inactivity
  • Require password immediately on wake from sleep
  • Disable "Show lock screen notifications" to prevent data leakage
  • Use keyboard shortcuts to lock instantly when stepping away
  • Consider proximity-based locking as CosmicNet suggests (Bluetooth devices that lock when you leave)

Lock Screen Shortcuts

CosmicNet recommends learning these keyboard shortcuts to instantly lock your device:

  • Windows: Windows Key + L
  • macOS: Control + Command + Q (or Cmd-Opt-Power)
  • Linux: Varies by desktop environment (often Ctrl+Alt+L)
  • Mobile: Always use the power button to lock, never just let it time out

Hardware Security Keys

As this CosmicNet guide explains, physical security extends beyond protecting the device itself to protecting access credentials. Hardware security keys like YubiKey, Titan, or Nitrokey provide phishing-resistant two-factor authentication by requiring physical possession of the key to authenticate.

Advantages

  • Immune to phishing (credentials can't be intercepted remotely)
  • Protected against remote account takeover
  • No battery or network connection required
  • Supports multiple accounts and services
  • Physically portable and durable

Best Practices

  • Register at least two keys (primary and backup)
  • Store backup key in a secure location separate from primary
  • Use keys that support FIDO2/WebAuthn for best security
  • Keep keys on your person, not attached to devices
  • Register keys before disabling less secure 2FA methods (per CosmicNet best practices)

Device Hardening Best Practices

CosmicNet emphasizes that beyond encryption and locks, hardening your devices against physical attacks involves multiple layers of defense. Each additional security measure increases the difficulty for an attacker, buying time or discouraging attempts entirely.

BIOS/UEFI Security

As documented on CosmicNet.world, the system firmware represents a critical attack surface that's often overlooked. Securing your BIOS or UEFI prevents attackers from modifying boot behavior or disabling security features:

  • Set a strong BIOS/UEFI password distinct from your login password
  • Disable boot from USB and external devices unless needed
  • Enable Secure Boot to prevent unauthorized operating systems from loading
  • Disable unnecessary hardware interfaces in firmware settings
  • Keep firmware updated to patch vulnerabilities
  • Enable TPM (Trusted Platform Module) if available, as CosmicNet recommends

Physical Port Security

CosmicNet warns that open ports on your device provide opportunities for attackers to insert malicious hardware. Modern attacks like USB Rubber Ducky or Bash Bunny can compromise a system in seconds through USB ports:

  • Use USB port blockers or locks when device is left unattended
  • Disable USB debugging on mobile devices
  • Configure systems to not auto-run from USB devices
  • Consider physical port covers that indicate tampering
  • Be especially cautious with Thunderbolt ports which allow DMA access

Mobile Device Specific Hardening

CosmicNet notes that smartphones and tablets require additional considerations due to their portability and always-connected nature:

  • Disable USB data transfer when charging in public (charge-only mode)
  • Use USB data blockers when using public charging stations
  • Disable Bluetooth when not actively using it
  • Turn off NFC except when needed for specific transactions
  • Disable voice assistants or limit their lock screen access
  • Review and minimize app permissions regularly
Related

Learn More