This post is related to
We have Non Balena devices in production using Zymbits Zymkey and encrypted filesystem to prevent misuse of devices stolen from their mounting location.
My current impression is that going this way makes our setup unnecessarily complex and costly and prevents us from choosing hardware that does not support this.
So I am looking for other ways to reduce mainly the risk of s.o. misusing the credentials they might find on the unencrypted device.
- Make sure the device has limited access to out backend systems.
- Implement a kind of tamper detection (not prevention) that informs us about unusual device metrics that indicate a risk that the device has been compromised.
My interest here is to sort out the second point: Which metrics or information available on the device could I use as triggers for a ‚I have been tampered with‘ message to the backend, knowing and accepting that some of them could be faked with some effort?
Our devices are stationary, so one thing I could check is if the location (gsm cell) has changed.
Any more ideas much welcome.